The vulnerability is due to lack of proper access controls when using systems utilities to troubleshoot certain system processes. An attacker could exploit this vulnerability by authenticating to the application and using the system utilities to stop certain FireAMP processes. An exploit could allow the attacker to stop certain FireAMP processes.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2gCqbdd
The vulnerability is due to lack of proper access controls when using systems utilities to troubleshoot certain system processes. An attacker could exploit this vulnerability by authenticating to the application and using the system utilities to stop certain FireAMP processes. An exploit could allow the attacker to stop certain FireAMP processes.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2gCqbdd
Security Impact Rating: Medium
CVE: CVE-2016-6449
from Cisco Security Advisory http://ift.tt/2gCqbdd
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.