CVE-2019-1932

A vulnerability in Cisco Advanced Malware Protection (AMP) for Endpoints for Windows could allow an authenticated, local attacker with administrator privileges to execute arbitrary code. The vulnerability is due to insufficient validation of dynamically loaded modules. An attacker could exploit this vulnerability by placing a file in a specific location in the Windows filesystem. A successful exploit could allow the attacker to execute the code with the privileges of the AMP service.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:cisco:advanced_malware_protection_for_endpoints:6.2\(3\):*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:37

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-amp-commandinj - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-amp-commandinj - Vendor Advisory

Information

Published : 2019-07-06 02:15

Updated : 2024-11-21 04:37


NVD link : CVE-2019-1932

Mitre link : CVE-2019-1932

CVE.ORG link : CVE-2019-1932


JSON object : View

Products Affected

cisco

  • advanced_malware_protection_for_endpoints

microsoft

  • windows
CWE
CWE-345

Insufficient Verification of Data Authenticity