// For flags

CVE-2018-15452

Cisco Advanced Malware Protection for Endpoints on Windows DLL Preloading Vulnerability

Severity Score

6.7
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the DLL loading component of Cisco Advanced Malware Protection (AMP) for Endpoints on Windows could allow an authenticated, local attacker to disable system scanning services or take other actions to prevent detection of unauthorized intrusions. To exploit this vulnerability, the attacker would need to have administrative credentials on the Windows system. The vulnerability is due to the improper validation of resources loaded by a system process at run time. An attacker could exploit this vulnerability by crafting a malicious DLL file and placing it in a specific location on the targeted system. A successful exploit could allow the attacker to disable the targeted system's scanning services and ultimately prevent the system from being protected from further intrusion. There are no workarounds that address this vulnerability.

Una vulnerabilidad en el componente de carga de DLL de Cisco Advanced Malware Protection (AMP) for Endpoints en Windows podría permitir que un atacante local autenticado deshabilite los servicios de escaneo del sistema o lleve a cabo otras acciones para evitar la detección de intrusiones no autorizadas. Para explotar esta vulnerabilidad, el atacante necesitaría contar con credenciales administrativas en el sistema Windows. La vulnerabilidad se debe a la validación incorrecta de recursos cargados por un proceso del sistema en tiempo de ejecución. Un atacante podría explotar esta vulnerabilidad manipulando un archivo DLL malicioso y colocándolo en una ubicación específica del sistema objetivo. Su explotación con éxito podría permitir que el atacante deshabilite los servicios de escaneo del sistema objetivo y, en última instancia, evite que el sistema siga protegido ante más intrusiones. No existen alternativas que aborden esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-08-17 CVE Reserved
  • 2018-11-13 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-427: Uncontrolled Search Path Element
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Advanced Malware Protection For Endpoints
Search vendor "Cisco" for product "Advanced Malware Protection For Endpoints"
--
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe