First published: Fri May 22 2020(Updated: )
A vulnerability in Cisco AMP for Endpoints Linux Connector Software and Cisco AMP for Endpoints Mac Connector Software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted packet to an affected device. A successful exploit could allow the attacker to cause the Cisco AMP for Endpoints service to crash and restart.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Advanced Malware Protection For Endpoints | <=1.12.3.698 | |
Cisco Advanced Malware Protection For Endpoints | <=1.12.3.738 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-3344.
The severity level of CVE-2020-3344 is medium (5.5).
Cisco AMP for Endpoints Linux Connector Software with version up to 1.12.3.698 and Cisco AMP for Endpoints Mac Connector Software with version up to 1.12.3.738 are affected by CVE-2020-3344.
The vulnerability in Cisco AMP for Endpoints Linux Connector Software and Cisco AMP for Endpoints Mac Connector Software is due to insufficient input validation.
Yes, an authenticated, local attacker is required to exploit CVE-2020-3344.