{"vulnerability": "cve-2016-6415", "sightings": [{"uuid": "b89e134c-5558-45e6-b448-2a114601d9f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6415", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "ffa5d601-83e6-4e3b-9633-045289bb1005", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6415", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971819", "content": "", "creation_timestamp": "2024-12-24T20:34:28.012944Z"}, {"uuid": "028440dd-3e33-4280-9893-b438252f7355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6415", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:42.000000Z"}, {"uuid": "dd0aa9e8-6c71-45e3-8d85-6f9941f280c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6415", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:12.000000Z"}, {"uuid": "a816b886-b677-43b8-bc11-8260417c71b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6415", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:09:49.000000Z"}, {"uuid": "4aea5067-4ea8-4427-9c3c-23def23e0b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2016-6415", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/234c8d93-b8a1-4fc0-927e-eb855390074a", "content": "", "creation_timestamp": "2026-02-02T12:26:58.815930Z"}, {"uuid": "2f1c4068-d3e1-495a-9879-0850d83be118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6415", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "499f3874-1b22-4ff7-bea0-f578eab5c2e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6415", "type": "seen", "source": "https://t.me/arpsyndicate/995", "content": "#ExploitObserverAlert\n\nCVE-2016-6415\n\nDESCRIPTION: Exploit Observer has 18 entries related to CVE-2016-6415. The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.\n\nFIRST-EPSS: 0.973180000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T18:07:58.000000Z"}, {"uuid": "5f4088bc-f5bd-484a-b605-b9b768af2b7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-6415", "type": "seen", "source": "Telegram/kZRFQIGYVV4mCn4IlToF1Tuh51jGe6zUk0QXIqGC8VmNL5Rz", "content": "", "creation_timestamp": "2025-01-28T03:22:55.000000Z"}]}