First published: Sat Jul 06 2019(Updated: )
A vulnerability in Cisco Advanced Malware Protection (AMP) for Endpoints for Windows could allow an authenticated, local attacker with administrator privileges to execute arbitrary code. The vulnerability is due to insufficient validation of dynamically loaded modules. An attacker could exploit this vulnerability by placing a file in a specific location in the Windows filesystem. A successful exploit could allow the attacker to execute the code with the privileges of the AMP service.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Advanced Malware Protection For Endpoints | =6.2\(3\) | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Advanced Malware Protection (AMP) for Endpoints vulnerability is CVE-2019-1932.
The severity of CVE-2019-1932 is high with a CVSS score of 6.7.
The affected software for this vulnerability is Cisco Advanced Malware Protection (AMP) for Endpoints version 6.2(3) on Windows.
The vulnerability is due to insufficient validation of dynamically loaded modules.
An attacker with administrator privileges can execute arbitrary code.