{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Cisco IPICS versions ant\u00e9rieures \u00e0 4.10(2)","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco AsyncOS toutes versions sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Email Security Appliance (ESA) sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-6372","url":"https://www.cve.org/CVERecord?id=CVE-2016-6372"},{"name":"CVE-2016-6357","url":"https://www.cve.org/CVERecord?id=CVE-2016-6357"},{"name":"CVE-2016-6358","url":"https://www.cve.org/CVERecord?id=CVE-2016-6358"},{"name":"CVE-2016-6360","url":"https://www.cve.org/CVERecord?id=CVE-2016-6360"},{"name":"CVE-2016-1480","url":"https://www.cve.org/CVERecord?id=CVE-2016-1480"},{"name":"CVE-2016-6430","url":"https://www.cve.org/CVERecord?id=CVE-2016-6430"},{"name":"CVE-2016-6356","url":"https://www.cve.org/CVERecord?id=CVE-2016-6356"},{"name":"CVE-2016-6397","url":"https://www.cve.org/CVERecord?id=CVE-2016-6397"},{"name":"CVE-2016-1481","url":"https://www.cve.org/CVERecord?id=CVE-2016-1481"},{"name":"CVE-2016-1486","url":"https://www.cve.org/CVERecord?id=CVE-2016-1486"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esawsa1 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa1"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa5 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-ipics2 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-ipics2"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa1 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa1"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa2 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa2"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco du 26 octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-ipics"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa3 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa3"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esawsa2 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa6 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa6"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esawsa3 du 26    octobre 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa3"}],"reference":"CERTFR-2016-AVI-363","revisions":[{"description":"version initiale.","revision_date":"2016-10-27T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Cisco</span>. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, un contournement\nde la politique de s\u00e9curit\u00e9 et une \u00e9l\u00e9vation de privil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-ipics2 du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa6 du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa3 du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa5 du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esawsa2 du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-ipics du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esawsa3 du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa2 du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esa1 du 26 octobre 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20161026-esawsa1 du 26 octobre 2016","url":null}]}
