// For flags

CVE-2020-3314

Cisco AMP for Endpoints Mac Connector Software File Scan Denial of Service Vulnerability

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in the file scan process of Cisco AMP for Endpoints Mac Connector Software could cause the scan engine to crash during the scan of local files, resulting in a restart of the AMP Connector and a denial of service (DoS) condition of the Cisco AMP for Endpoints service. The vulnerability is due to insufficient input validation of specific file attributes. An attacker could exploit this vulnerability by providing a crafted file to a user of an affected system. A successful exploit could allow the attacker to cause the Cisco AMP for Endpoints service to crash, resulting in missed detection and logging of the potentially malicious file. Continued attempts to scan the file could result in a DoS condition of the Cisco AMP for Endpoints service.

Una vulnerabilidad en el proceso de escaneo de archivos de Cisco AMP para Endpoints Mac Connector Software, podría causar que el motor de escaneo se bloquee durante el escaneo de archivos locales, resultando en un reinicio del AMP Connector y una condición de denegación de servicio (DoS) de AMP Connector para el servicio de Endpoints. La vulnerabilidad es debido a una comprobación de entrada insuficiente de atributos de archivo específicos. Un atacante podría explotar esta vulnerabilidad al proporcionar un archivo diseñado a un usuario de un sistema afectado. Una explotación con éxito podría permitir a un atacante causar el bloqueo del servicio Cisco AMP para Endpoints, resultando en la detección y registro fallidos del archivo potencialmente malicioso. Los intentos continuos de escanear el archivo podría resultar en una condición DoS del servicio Cisco AMP para Endpoints.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-05-22 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Advanced Malware Protection For Endpoints
Search vendor "Cisco" for product "Advanced Malware Protection For Endpoints"
< 1.12.3.738
Search vendor "Cisco" for product "Advanced Malware Protection For Endpoints" and version " < 1.12.3.738"
mac_os
Affected