The virtual network stack on Cisco AMP Threat Grid Appliance devices before 2.1.1 allows remote attackers to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Amp_threat_grid_appliance | Cisco | 1.0 (including) | 1.0 (including) |
Amp_threat_grid_appliance | Cisco | 1.1 (including) | 1.1 (including) |
Amp_threat_grid_appliance | Cisco | 1.2 (including) | 1.2 (including) |
Amp_threat_grid_appliance | Cisco | 1.2.1 (including) | 1.2.1 (including) |
Amp_threat_grid_appliance | Cisco | 1.3 (including) | 1.3 (including) |
Amp_threat_grid_appliance | Cisco | 1.4 (including) | 1.4 (including) |
Amp_threat_grid_appliance | Cisco | 1.4.1 (including) | 1.4.1 (including) |
Amp_threat_grid_appliance | Cisco | 1.4.2 (including) | 1.4.2 (including) |
Amp_threat_grid_appliance | Cisco | 1.4.3 (including) | 1.4.3 (including) |
Amp_threat_grid_appliance | Cisco | 1.4.4 (including) | 1.4.4 (including) |
Amp_threat_grid_appliance | Cisco | 1.4.5 (including) | 1.4.5 (including) |
Amp_threat_grid_appliance | Cisco | 1.4.6 (including) | 1.4.6 (including) |
Amp_threat_grid_appliance | Cisco | 2.0 (including) | 2.0 (including) |
Amp_threat_grid_appliance | Cisco | 2.0.1 (including) | 2.0.1 (including) |
Amp_threat_grid_appliance | Cisco | 2.0.2 (including) | 2.0.2 (including) |
Amp_threat_grid_appliance | Cisco | 2.0.3 (including) | 2.0.3 (including) |
Amp_threat_grid_appliance | Cisco | 2.0.4 (including) | 2.0.4 (including) |
Amp_threat_grid_appliance | Cisco | 2.1 (including) | 2.1 (including) |