PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-0919 Rsa CVE debrief

CVE-2016-0919 is a cross-site scripting (XSS) vulnerability affecting EMC RSA Web Threat Detection version 5.0, 5.1, and 5.1.2. NVD rates it CVSS 6.1 (Medium) and maps it to CWE-79. The published vector indicates network reachability, low attack complexity, no privileges required, and user interaction required, with potential impact to confidentiality and integrity but not availability. For defenders, the main concern is any deployment of the affected RSA Web Threat Detection releases, especially where users or administrators interact with web-based interfaces. Because XSS can be used to run attacker-controlled script in a victim's browser context, organizations should treat exposed consoles and user-facing workflows as higher-risk surfaces until affected versions are remediated.

Vendor
Rsa
Product
CVE-2016-0919
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-03
Original CVE updated
2026-05-13
Advisory published
2017-02-03
Advisory updated
2026-05-13

Who should care

Organizations running EMC RSA Web Threat Detection 5.0, 5.1, or 5.1.2; administrators responsible for web security monitoring tooling; teams managing browser-accessed administrative consoles or report views.

Technical summary

NVD lists CVE-2016-0919 as CWE-79 (cross-site scripting) in RSA Web Threat Detection 5.0, 5.1, and 5.1.2. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates a remotely reachable issue that requires user interaction and can affect the security context of the victim's browser session. The record includes vulnerable CPE criteria for the three affected versions and third-party advisory references from EMC security_alert metadata.

Defensive priority

Medium priority. Remediate promptly if the affected product is deployed and accessible to users, especially in environments where administrative or monitoring actions are performed through the web UI.

Recommended defensive actions

  • Inventory RSA Web Threat Detection deployments and confirm whether versions 5.0, 5.1, or 5.1.2 are in use.
  • Follow vendor and advisory references linked from the CVE record for remediation guidance.
  • Upgrade or replace affected versions with a non-vulnerable release if one is available from the vendor.
  • Restrict access to web interfaces to trusted administrative networks where feasible.
  • Review application controls that handle user-supplied content and ensure output encoding and input handling are applied consistently.
  • Monitor for signs of XSS abuse in browser-facing workflows, including unexpected script execution or unusual account actions after user interaction.

Evidence notes

This debrief is based only on the supplied NVD/CVE record and linked official references. The record states the vulnerability is an XSS issue in EMC RSA Web Threat Detection versions 5.0, 5.1, and 5.1.2, with CVSS 6.1 and CWE-79. The NVD metadata includes vulnerable CPE criteria for those versions and third-party advisory links (SecurityFocus and SecurityTracker) referenced in the record. No exploit details or unverified remediation claims are included.

Official resources

CVE published by the CVE/NVD record on 2017-02-03; NVD metadata last modified 2026-05-13. Timing in this debrief follows the supplied CVE published date, not the debrief generation date.