Vulnerability identifier: #VU410
Vulnerability risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco FireSIGHT
Server applications /
Remote management servers, RDP, SSH
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote user to bypass malicious files detection on the target system.
The weakness is caused by incorrect validation of HTTP headers. Specially crafted HTTP header values sent by attacker can be used to bypass malware detection and blocking features on the target system.
Successful exploitation of this vulnerability may allow a remote user to bypass security mechanism on the vulnerable system.
Mitigation
Update to 6.1
Vulnerable software versions
Cisco FireSIGHT: 5.3.0 - 6.0.1
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.