CVE-2018-15452
Cisco Advanced Malware Protection for Endpoints on Windows DLL Preloading Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the DLL loading component of Cisco Advanced Malware Protection (AMP) for Endpoints on Windows could allow an authenticated, local attacker to disable system scanning services or take other actions to prevent detection of unauthorized intrusions. To exploit this vulnerability, the attacker would need to have administrative credentials on the Windows system. The vulnerability is due to the improper validation of resources loaded by a system process at run time. An attacker could exploit this vulnerability by crafting a malicious DLL file and placing it in a specific location on the targeted system. A successful exploit could allow the attacker to disable the targeted system's scanning services and ultimately prevent the system from being protected from further intrusion. There are no workarounds that address this vulnerability.
Una vulnerabilidad en el componente de carga de DLL de Cisco Advanced Malware Protection (AMP) for Endpoints en Windows podría permitir que un atacante local autenticado deshabilite los servicios de escaneo del sistema o lleve a cabo otras acciones para evitar la detección de intrusiones no autorizadas. Para explotar esta vulnerabilidad, el atacante necesitaría contar con credenciales administrativas en el sistema Windows. La vulnerabilidad se debe a la validación incorrecta de recursos cargados por un proceso del sistema en tiempo de ejecución. Un atacante podría explotar esta vulnerabilidad manipulando un archivo DLL malicioso y colocándolo en una ubicación específica del sistema objetivo. Su explotación con éxito podría permitir que el atacante deshabilite los servicios de escaneo del sistema objetivo y, en última instancia, evite que el sistema siga protegido ante más intrusiones. No existen alternativas que aborden esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-08-17 CVE Reserved
- 2018-11-13 CVE Published
- 2023-03-08 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-427: Uncontrolled Search Path Element
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/105759 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181029-amp-dll | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Advanced Malware Protection For Endpoints Search vendor "Cisco" for product "Advanced Malware Protection For Endpoints" | - | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|