PatchSiren cyber security CVE debrief
CVE-2016-0919 Rsa CVE debrief
CVE-2016-0919 is a cross-site scripting (XSS) vulnerability affecting EMC RSA Web Threat Detection version 5.0, 5.1, and 5.1.2. NVD rates it CVSS 6.1 (Medium) and maps it to CWE-79. The published vector indicates network reachability, low attack complexity, no privileges required, and user interaction required, with potential impact to confidentiality and integrity but not availability. For defenders, the main concern is any deployment of the affected RSA Web Threat Detection releases, especially where users or administrators interact with web-based interfaces. Because XSS can be used to run attacker-controlled script in a victim's browser context, organizations should treat exposed consoles and user-facing workflows as higher-risk surfaces until affected versions are remediated.
- Vendor
- Rsa
- Product
- CVE-2016-0919
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-03
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-03
- Advisory updated
- 2026-05-13
Who should care
Organizations running EMC RSA Web Threat Detection 5.0, 5.1, or 5.1.2; administrators responsible for web security monitoring tooling; teams managing browser-accessed administrative consoles or report views.
Technical summary
NVD lists CVE-2016-0919 as CWE-79 (cross-site scripting) in RSA Web Threat Detection 5.0, 5.1, and 5.1.2. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates a remotely reachable issue that requires user interaction and can affect the security context of the victim's browser session. The record includes vulnerable CPE criteria for the three affected versions and third-party advisory references from EMC security_alert metadata.
Defensive priority
Medium priority. Remediate promptly if the affected product is deployed and accessible to users, especially in environments where administrative or monitoring actions are performed through the web UI.
Recommended defensive actions
- Inventory RSA Web Threat Detection deployments and confirm whether versions 5.0, 5.1, or 5.1.2 are in use.
- Follow vendor and advisory references linked from the CVE record for remediation guidance.
- Upgrade or replace affected versions with a non-vulnerable release if one is available from the vendor.
- Restrict access to web interfaces to trusted administrative networks where feasible.
- Review application controls that handle user-supplied content and ensure output encoding and input handling are applied consistently.
- Monitor for signs of XSS abuse in browser-facing workflows, including unexpected script execution or unusual account actions after user interaction.
Evidence notes
This debrief is based only on the supplied NVD/CVE record and linked official references. The record states the vulnerability is an XSS issue in EMC RSA Web Threat Detection versions 5.0, 5.1, and 5.1.2, with CVSS 6.1 and CWE-79. The NVD metadata includes vulnerable CPE criteria for those versions and third-party advisory links (SecurityFocus and SecurityTracker) referenced in the record. No exploit details or unverified remediation claims are included.
Official resources
-
CVE-2016-0919 CVE record
CVE.org
-
CVE-2016-0919 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
CVE published by the CVE/NVD record on 2017-02-03; NVD metadata last modified 2026-05-13. Timing in this debrief follows the supplied CVE published date, not the debrief generation date.