First published: Wed Nov 07 2018(Updated: )
A vulnerability in the system scanning component of Cisco Immunet and Cisco Advanced Malware Protection (AMP) for Endpoints running on Microsoft Windows could allow a local attacker to disable the scanning functionality of the product. This could allow executable files to be launched on the system without being analyzed for threats. The vulnerability is due to improper process resource handling. An attacker could exploit this vulnerability by gaining local access to a system running Microsoft Windows and protected by Cisco Immunet or Cisco AMP for Endpoints and executing a malicious file. A successful exploit could allow the attacker to prevent the scanning services from functioning properly and ultimately prevent the system from being protected from further intrusion. There are no workarounds that address this vulnerability.
Credit: John Page (hyp3rlinx) ApparitionSec
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Immunet | ||
Cisco Advanced Malware Protection |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20181107-imm-dos is classified as high due to its potential impact on the scanning capabilities of the affected software.
To mitigate cisco-sa-20181107-imm-dos, ensure that you update Cisco Immunet and Cisco Advanced Malware Protection to the latest versions provided by Cisco.
The products affected by cisco-sa-20181107-imm-dos are Cisco Immunet and Cisco Advanced Malware Protection (AMP) for Endpoints running on Microsoft Windows.
A local attacker with access to the system can exploit cisco-sa-20181107-imm-dos to disable the scanning functionality of the affected products.
The impact of cisco-sa-20181107-imm-dos can lead to unauthorized execution of files by disabling the malware scanning mechanism.