Show plain JSON{"id": "CVE-2021-1386", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.0, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.0}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2021-04-08T04:15:12.343", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-tu79hvkO", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-tu79hvkO", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-427"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges."}, {"lang": "es", "value": "Una vulnerabilidad en el mecanismo de carga de la dynamic link library (DLL) en Cisco Advanced Malware Protection (AMP) para Endpoints Windows Connector, ClamAV para Windows e Immunet, podr\u00eda permitir a un atacante local autenticado llevar a cabo un ataque de secuestro DLL en un sistema Windows afectado. Para explotar esta vulnerabilidad, el atacante necesitar\u00eda credenciales v\u00e1lidas en el sistema. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de las rutas de b\u00fasqueda de directorios en tiempo de ejecuci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad al colocar un archivo DLL malicioso en un sistema afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios SYSTEM"}], "lastModified": "2024-11-21T05:44:14.060", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:advanced_malware_protection_for_endpoints:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "9DC181C7-11E3-4AA8-8E4B-43F1C0D3F73E", "versionEndExcluding": "7.3.15"}, {"criteria": "cpe:2.3:a:cisco:clamav:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "5BBCAAEA-C3BC-41CB-9395-22309FDF80DE", "versionEndExcluding": "0.103.2"}, {"criteria": "cpe:2.3:a:cisco:immunet:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "F56DFDB8-3196-4BDC-9254-66849E3729E8", "versionEndExcluding": "7.4.0"}], "operator": "OR"}]}], "sourceIdentifier": "ykramarz@cisco.com"}