Cisco Bug: CSCvt61369 - Cisco AMP for Endpoints Mac Connector Software File Scan Denial of Service Vulnerability
Jun 10, 2020
- Cisco AMP for Endpoints
Known Affected Releases
1.11(0) 1.11(1) 1.12(0) 1.12(1) 1.12(2)
Symptom: A vulnerability in the file scan process of Cisco AMP for Endpoints Mac Connector Software could cause the scan engine to crash during the scan of local files, resulting in a restart of the AMP Connector and a denial of service (DoS) condition of the Cisco AMP for Endpoints service. The vulnerability is due to insufficient input validation of specific file attributes. An attacker could exploit this vulnerability by providing a crafted file to a user of an affected system. A successful exploit could allow the attacker to cause the Cisco AMP for Endpoints service to crash, resulting in missed detection and logging of the potentially malicious file. Continued attempts to scan the file could result in a DoS condition of the Cisco AMP for Endpoints service. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4emac-dos-kfKjUGtM Conditions: At the time of publication, this vulnerability affected Cisco AMP for Endpoints Mac Connector Software Releases 184.108.40.2063 and prior. At the time of publication, Cisco AMP for Endpoints Mac Connector Software Releases 220.127.116.118 and later contained the fix for this vulnerability.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases