A vulnerability in the file type detection mechanism of the Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector could allow an unauthenticated, remote attacker to bypass malware detection. The vulnerability occurs because the software relies on only the file extension for detecting DMG files. An attacker could exploit this vulnerability by sending a DMG file with a nonstandard extension to a device that is running an affected AMP for Endpoints macOS Connector. An exploit could allow the attacker to bypass configured malware detection. Cisco Bug IDs: CSCve34034.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-amp | Vendor Advisory |
https://wwws.nightwatchcybersecurity.com/2018/02/25/research-compressed-files-auto-detection-on-macos/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-04-19 13:29
Updated : 2020-09-04 11:26
NVD link : CVE-2018-0237
Mitre link : CVE-2018-0237
JSON object : View
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference
Products Affected
cisco
- advanced_malware_protection_for_endpoints