// For flags

CVE-2020-3343

Cisco AMP for Endpoints Linux Connector and AMP for Endpoints Mac Connector Software Memory Buffer Vulnerability

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in Cisco AMP for Endpoints Linux Connector Software and Cisco AMP for Endpoints Mac Connector Software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted packet to an affected device. A successful exploit could allow the attacker to cause the Cisco AMP for Endpoints service to crash and restart.

Una vulnerabilidad en Cisco AMP para Endpoints Linux Connector Software y Cisco AMP para Endpoints Mac Connector Software, podría permitir a un atacante local autenticado causar un desbordamiento de búfer sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante podría explotar esta vulnerabilidad al enviar un paquete diseñado hacia un dispositivo afectado. Una explotación con éxito podría permitir a un atacante hacer que el servicio Cisco AMP para Endpoints se bloquee y reinicie.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-05-22 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Advanced Malware Protection For Endpoints
Search vendor "Cisco" for product "Advanced Malware Protection For Endpoints"
<= 1.12.3.698
Search vendor "Cisco" for product "Advanced Malware Protection For Endpoints" and version " <= 1.12.3.698"
linux
Affected
Cisco
Search vendor "Cisco"
Advanced Malware Protection For Endpoints
Search vendor "Cisco" for product "Advanced Malware Protection For Endpoints"
<= 1.12.3.738
Search vendor "Cisco" for product "Advanced Malware Protection For Endpoints" and version " <= 1.12.3.738"
mac_os
Affected