CVE-2016-6367

ENISA EUVD: EUVD-2016-7290 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 5, 2026 Published: 2016-08-18

EPSS Score

Source: FIRST.org · 2026-05-23
18.76%
probability
This CVE has a 18.76% probability of being exploited in the next 30 days.
0% Top 95.4th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v2 (legacy)

6.8
MEDIUM
Access Vector
Local
Access Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
AV:L/AC:L/Au:S/C:C/I:C/A:C

Description

VulnerabilityLookup (CNA)
Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.

Affected Products

n/a
n/a

Google Project Zero

Discovered
Aug. 15, 2016
Patched
Aug. 17, 2016
Reported by
Shadow Brokers
Root Cause Analysis
???

Signal Intelligence

Confidence
95%
EPSS 18.76%
CVSS v3.1 7.8
Mentions 0

CNA Information

CNA Assigner
cisco

Analyst Note

Auto-imported from Google Project Zero — confirmed zero-day by definition.

Triage Info

Decided atMar 05, 2026
Published DateAug 18, 2016