CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
A vulnerability in the endpoint software of Cisco Secure Endpoint for Windows could allow an authenticated, local attacker to evade endpoint protection within a limited time window. This vulnerability is due to a timing issue that occurs between various software components. An attacker could exploit this vulnerability by persuading a user to put a malicious file into a specific folder and then persuading the user to execute the file within a limited time window. A successful exploit could allow the attacker to cause the endpoint software to fail to quarantine the malicious file or kill its process. Note: This vulnerability only applies to deployments that have the Windows Folder Redirection feature enabled.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | secure_endpoint | - | cpe:2.3:a:cisco:secure_endpoint:-:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.0.7 | cpe:2.3:a:cisco:secure_endpoint:6.0.7:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.0.9 | cpe:2.3:a:cisco:secure_endpoint:6.0.9:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.1.5 | cpe:2.3:a:cisco:secure_endpoint:6.1.5:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.1.7 | cpe:2.3:a:cisco:secure_endpoint:6.1.7:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.1.9 | cpe:2.3:a:cisco:secure_endpoint:6.1.9:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.2.1 | cpe:2.3:a:cisco:secure_endpoint:6.2.1:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.2.3 | cpe:2.3:a:cisco:secure_endpoint:6.2.3:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.2.5 | cpe:2.3:a:cisco:secure_endpoint:6.2.5:*:*:*:*:windows:*:* |
cisco | secure_endpoint | 6.2.9 | cpe:2.3:a:cisco:secure_endpoint:6.2.9:*:*:*:*:windows:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco Secure Endpoint",
"versions": [
{
"version": "6.0.9",
"status": "affected"
},
{
"version": "6.0.7",
"status": "affected"
},
{
"version": "6.1.5",
"status": "affected"
},
{
"version": "6.1.7",
"status": "affected"
},
{
"version": "6.1.9",
"status": "affected"
},
{
"version": "6.2.1",
"status": "affected"
},
{
"version": "6.2.5",
"status": "affected"
},
{
"version": "6.2.19",
"status": "affected"
},
{
"version": "6.2.3",
"status": "affected"
},
{
"version": "6.2.9",
"status": "affected"
},
{
"version": "6.3.5",
"status": "affected"
},
{
"version": "6.3.1",
"status": "affected"
},
{
"version": "6.3.7",
"status": "affected"
},
{
"version": "6.3.3",
"status": "affected"
},
{
"version": "7.0.5",
"status": "affected"
},
{
"version": "7.1.1",
"status": "affected"
},
{
"version": "7.1.5",
"status": "affected"
},
{
"version": "7.2.13",
"status": "affected"
},
{
"version": "7.2.7",
"status": "affected"
},
{
"version": "7.2.3",
"status": "affected"
},
{
"version": "7.2.11",
"status": "affected"
},
{
"version": "7.2.5",
"status": "affected"
},
{
"version": "7.3.1",
"status": "affected"
},
{
"version": "7.3.9",
"status": "affected"
},
{
"version": "7.3.3",
"status": "affected"
},
{
"version": "7.3.5",
"status": "affected"
},
{
"version": "8.1.7",
"status": "affected"
},
{
"version": "8.1.5",
"status": "affected"
},
{
"version": "8.1.3.21242",
"status": "affected"
},
{
"version": "8.1.7.21512",
"status": "affected"
},
{
"version": "8.1.3",
"status": "affected"
},
{
"version": "8.1.5.21322",
"status": "affected"
},
{
"version": "8.1.7.21417",
"status": "affected"
}
]
}
]