A vulnerability in the file type detection mechanism of the Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector could allow an unauthenticated, remote attacker to bypass malware detection. The vulnerability occurs because the software relies on only the file extension for detecting DMG files. An attacker could exploit this vulnerability by sending a DMG file with a nonstandard extension to a device that is running an affected AMP for Endpoints macOS Connector. An exploit could allow the attacker to bypass configured malware detection. Cisco Bug IDs: CSCve34034.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-amp - Vendor Advisory | |
References | () https://wwws.nightwatchcybersecurity.com/2018/02/25/research-compressed-files-auto-detection-on-macos/ - Third Party Advisory |
Information
Published : 2018-04-19 20:29
Updated : 2024-11-21 03:37
NVD link : CVE-2018-0237
Mitre link : CVE-2018-0237
CVE.ORG link : CVE-2018-0237
JSON object : View
Products Affected
cisco
- advanced_malware_protection_for_endpoints