Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-e6qx-uhr4-kqb8
Vulnerability ID VCID-e6qx-uhr4-kqb8
Aliases CVE-2016-8627
Summary admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://rhn.redhat.com/errata/RHSA-2017-0170.html
http://rhn.redhat.com/errata/RHSA-2017-0171.html
http://rhn.redhat.com/errata/RHSA-2017-0172.html
http://rhn.redhat.com/errata/RHSA-2017-0173.html
http://rhn.redhat.com/errata/RHSA-2017-0244.html
http://rhn.redhat.com/errata/RHSA-2017-0245.html
http://rhn.redhat.com/errata/RHSA-2017-0246.html
http://rhn.redhat.com/errata/RHSA-2017-0247.html
http://rhn.redhat.com/errata/RHSA-2017-0250.html
https://access.redhat.com/errata/RHSA-2017:3454
https://access.redhat.com/errata/RHSA-2017:3455
https://access.redhat.com/errata/RHSA-2017:3456
https://access.redhat.com/errata/RHSA-2017:3458
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8627.json
https://api.first.org/data/v1/epss?cve=CVE-2016-8627
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8627
http://www.securityfocus.com/bid/95698
http://www.securitytracker.com/id/1037660
1388240 https://bugzilla.redhat.com/show_bug.cgi?id=1388240
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*
CVE-2016-8627 https://nvd.nist.gov/vuln/detail/CVE-2016-8627
RHSA-2017:0170 https://access.redhat.com/errata/RHSA-2017:0170
RHSA-2017:0171 https://access.redhat.com/errata/RHSA-2017:0171
RHSA-2017:0172 https://access.redhat.com/errata/RHSA-2017:0172
RHSA-2017:0173 https://access.redhat.com/errata/RHSA-2017:0173
RHSA-2017:0244 https://access.redhat.com/errata/RHSA-2017:0244
RHSA-2017:0245 https://access.redhat.com/errata/RHSA-2017:0245
RHSA-2017:0246 https://access.redhat.com/errata/RHSA-2017:0246
RHSA-2017:0247 https://access.redhat.com/errata/RHSA-2017:0247
RHSA-2017:0250 https://access.redhat.com/errata/RHSA-2017:0250
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8627.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2016-8627
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2016-8627
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-8627
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.74027
EPSS Score 0.00801
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T14:32:12.149734+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8627.json 38.0.0