High severity7.5NVD Advisory· Published Feb 12, 2016· Updated May 6, 2026
CVE-2016-1315
CVE-2016-1315
Description
The proxy engine in Cisco Advanced Malware Protection (AMP), when used with Email Security Appliance (ESA) 9.5.0-201, 9.6.0-051, and 9.7.0-125, allows remote attackers to bypass intended content restrictions via a malformed e-mail message containing an encoded file, aka Bug ID CSCux45338.
Affected products
5cpe:2.3:o:cisco:email_security_appliance_firmeware:9.1.0-032:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:cisco:email_security_appliance_firmeware:9.1.0-032:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:email_security_appliance_firmeware:9.5.0-201:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:email_security_appliance_firmeware:9.6.0-051:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:email_security_appliance_firmeware:9.7.0-125:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:email_security_appliance_firmeware:9.7.0-782:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160211-esaampnvdVendor Advisory
- www.securitytracker.com/id/1035008nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.