Check Point Reference: | CPAI-2023-0495 |
Date Published: | 10 Jul 2023 |
Severity: | Medium |
Last Updated: | Monday 10 July, 2023 |
Source: | |
Industry Reference: | CVE-2023-20052 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Cisco Secure Endpoint for Linux prior to 1.20.2 Cisco Secure Endpoint for MacOS prior to 1.21.1 Cisco Secure Endpoint for Windows prior to 7.5.9 Cisco Secure Endpoint for Windows versions 8.0.1.21160 to 8.1.5 Cisco Secure Endpoint Private Cloud prior to 3.6.0 ClamAV versions 0.103.7 and prior ClamAV versions 0.104.0 to 0.105.1 |
Vulnerability Description | An XML external entity injection vulnerability exists in Cisco Secure Endpoint. Successful exploitation of this vulnerability could allow a remote attacker to retrieve the content of arbitrary files. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Cisco Protection Violation.
Attack Information: Cisco Secure Endpoint XML External Entity Injection ()