Cisco ASA SNMP Remote Code Execution Vulnerability

Number: AL16-016
Date: 18 August 2016


The purpose of this alert is to bring attention to a recently disclosed vulnerability in Cisco’s Adaptive Security Appliance.


CCIRC is aware of a recently disclosed vulnerability in Cisco’s Adaptive Security Appliance.  Identified as CVE-2016-6366, this vulnerability in the SNMP code can allow a remote unauthenticated attacker to cause a reload of the affected system or to remotely execute code.  Exploit code has been released publicly.

A crafted IPv4 SNMP packet could cause a buffer overflow and the attacker must know the community string of the affected system in order to successfully exploit this vulnerability.

All versions of SNMP are affected by this vulnerability and software running on the following devices:

Suggested Action

Due to the potential risk presented by this vulnerability, CCIRC recommends that system administrators monitor for the developer released security fix. Workarounds have been published by the vendor.


Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589

Date modified: