CVE-2018-0237
Summary
| CVE | CVE-2018-0237 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-04-19 20:29:00 UTC |
| Updated | 2020-09-04 18:26:00 UTC |
| Description | A vulnerability in the file type detection mechanism of the Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector could allow an unauthenticated, remote attacker to bypass malware detection. The vulnerability occurs because the software relies on only the file extension for detecting DMG files. An attacker could exploit this vulnerability by sending a DMG file with a nonstandard extension to a device that is running an affected AMP for Endpoints macOS Connector. An exploit could allow the attacker to bypass configured malware detection. Cisco Bug IDs: CSCve34034. |
Risk And Classification
Problem Types: CWE-706
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Advanced Malware Protection For Endpoints | 1.4(5) | All | All | All |
| Application | Cisco | Advanced Malware Protection For Endpoints | 1.4\(5\) | All | All | All |
| Application | Cisco | Advanced Malware Protection For Endpoints | 1.4\(5\) | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco AMP for Endpoints macOS Connector DMG File Malware Bypass Vulnerability | CONFIRM | tools.cisco.com | Vendor Advisory |
| Research: Auto-detection of Compressed Files in Apple’s macOS | Nightwatch Cybersecurity | MISC | wwws.nightwatchcybersecurity.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.