Lucene search

K
ciscoCiscoCISCO-SA-20180418-AMP
HistoryApr 18, 2018 - 4:00 p.m.

Cisco AMP for Endpoints macOS Connector DMG File Malware Bypass Vulnerability

2018-04-1816:00:00
tools.cisco.com
25

EPSS

0.001

Percentile

48.5%

A vulnerability in the file type detection mechanism of the Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector could allow an unauthenticated, remote attacker to bypass malware detection.

The vulnerability occurs because the software relies on only the file extension for detecting DMG files. An attacker could exploit this vulnerability by sending a DMG file with a nonstandard extension to a device that is running an affected AMP for Endpoints macOS Connector. An exploit could allow the attacker to bypass configured malware detection.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-amp [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-amp”]

Affected configurations

Vulners
Node
ciscocisco_amp_for_endpointsMatchany
OR
ciscocisco_amp_for_endpointsMatchany
VendorProductVersionCPE
ciscocisco_amp_for_endpointsanycpe:2.3:a:cisco:cisco_amp_for_endpoints:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

48.5%

Related for CISCO-SA-20180418-AMP