5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
4.8 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
A vulnerability in the endpoint software of Cisco Secure Endpoint for Windows could allow an authenticated, local attacker to evade endpoint protection within a limited time window. This vulnerability is due to a timing issue that occurs between various software components. An attacker could exploit this vulnerability by persuading a user to put a malicious file into a specific folder and then persuading the user to execute the file within a limited time window. A successful exploit could allow the attacker to cause the endpoint software to fail to quarantine the malicious file or kill its process. Note: This vulnerability only applies to deployments that have the Windows Folder Redirection feature enabled.
[
{
"vendor": "Cisco",
"product": "Cisco Secure Endpoint",
"versions": [
{
"version": "6.0.9",
"status": "affected"
},
{
"version": "6.0.7",
"status": "affected"
},
{
"version": "6.1.5",
"status": "affected"
},
{
"version": "6.1.7",
"status": "affected"
},
{
"version": "6.1.9",
"status": "affected"
},
{
"version": "6.2.1",
"status": "affected"
},
{
"version": "6.2.5",
"status": "affected"
},
{
"version": "6.2.19",
"status": "affected"
},
{
"version": "6.2.3",
"status": "affected"
},
{
"version": "6.2.9",
"status": "affected"
},
{
"version": "6.3.5",
"status": "affected"
},
{
"version": "6.3.1",
"status": "affected"
},
{
"version": "6.3.7",
"status": "affected"
},
{
"version": "6.3.3",
"status": "affected"
},
{
"version": "7.0.5",
"status": "affected"
},
{
"version": "7.1.1",
"status": "affected"
},
{
"version": "7.1.5",
"status": "affected"
},
{
"version": "7.2.13",
"status": "affected"
},
{
"version": "7.2.7",
"status": "affected"
},
{
"version": "7.2.3",
"status": "affected"
},
{
"version": "7.2.11",
"status": "affected"
},
{
"version": "7.2.5",
"status": "affected"
},
{
"version": "7.3.1",
"status": "affected"
},
{
"version": "7.3.9",
"status": "affected"
},
{
"version": "7.3.3",
"status": "affected"
},
{
"version": "7.3.5",
"status": "affected"
},
{
"version": "8.1.7",
"status": "affected"
},
{
"version": "8.1.5",
"status": "affected"
},
{
"version": "8.1.3.21242",
"status": "affected"
},
{
"version": "8.1.7.21512",
"status": "affected"
},
{
"version": "8.1.3",
"status": "affected"
},
{
"version": "8.1.5.21322",
"status": "affected"
},
{
"version": "8.1.7.21417",
"status": "affected"
}
]
}
]
5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
4.8 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%