6.7
CVSSv3

CVE-2019-1932

Published: 06/07/2019 Updated: 09/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in Cisco Advanced Malware Protection (AMP) for Endpoints for Windows could allow an authenticated, local attacker with administrator privileges to execute arbitrary code. The vulnerability is due to insufficient validation of dynamically loaded modules. An attacker could exploit this vulnerability by placing a file in a specific location in the Windows filesystem. A successful exploit could allow the malicious user to execute the code with the privileges of the AMP service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco advanced_malware_protection_for_endpoints 6.2\\(3\\)

Vendor Advisories

A vulnerability in Cisco Advanced Malware Protection (AMP) for Endpoints for Windows could allow an authenticated, local attacker with administrator privileges to execute arbitrary code The vulnerability is due to insufficient validation of dynamically loaded modules An attacker could exploit this vulnerability by placing a file in a specific loc ...

Github Repositories

Rust POC for CVE-2018-1932X kernel driver vulnerabilities

CVE-2018-1932X ( Rust Exploit POC) for GIGABYTE APP Center v10521 and earlier Just because your target is memory unsafe doesn't mean your exploit has to be! Vulnerabilities used : CVE-2018-19320 - ring0 memcpy-like functionality CVE-2018-19323 - read and write Machine Specific Registers (MSRs) Tested on: 20H1: Windows 10 Kernel Version 19041 MP (1 procs) Free x64