First published: Thu Apr 19 2018(Updated: )
A vulnerability in the file type detection mechanism of the Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector could allow an unauthenticated, remote attacker to bypass malware detection. The vulnerability occurs because the software relies on only the file extension for detecting DMG files. An attacker could exploit this vulnerability by sending a DMG file with a nonstandard extension to a device that is running an affected AMP for Endpoints macOS Connector. An exploit could allow the attacker to bypass configured malware detection. Cisco Bug IDs: CSCve34034.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Advanced Malware Protection For Endpoints | =1.4\(5\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0237 is a vulnerability in the file type detection mechanism of the Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector that could allow an unauthenticated, remote attacker to bypass malware detection.
CVE-2018-0237 occurs because the software relies on only the file extension for detecting malware, allowing an attacker to bypass detection by manipulating file extensions.
CVE-2018-0237 has a severity rating of 5.8, which is considered medium.
CVE-2018-0237 affects Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector version 1.4(5).
To fix CVE-2018-0237, it is recommended to update to a patched version of Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector.