CVE-2021-1386

7.0 HIGH

📋 TL;DR

This vulnerability allows authenticated local attackers to perform DLL hijacking attacks on affected Cisco security products for Windows. Attackers can execute arbitrary code with SYSTEM privileges by placing malicious DLL files in specific directories. Affected products include Cisco AMP for Endpoints Windows Connector, ClamAV for Windows, and Immunet.

💻 Affected Systems

Products:
  • Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector
  • ClamAV for Windows
  • Immunet
Versions: Specific vulnerable versions listed in Cisco advisory; generally versions prior to fixes released in 2021
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of these products. Requires authenticated local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, allowing complete control over the affected Windows system, data theft, lateral movement, and persistence establishment.

🟠

Likely Case

Privilege escalation from authenticated user to SYSTEM, enabling installation of malware, backdoors, or credential harvesting tools on the compromised system.

🟢

If Mitigated

Limited impact due to proper access controls, application whitelisting, and restricted user permissions preventing DLL placement in vulnerable directories.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring authenticated access to the Windows system.
🏢 Internal Only: HIGH - Internal attackers with valid credentials can exploit this to gain SYSTEM privileges on affected endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated local access and ability to place DLL files in specific directories. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Cisco advisory for specific fixed versions for each product

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-tu79hvkO

Restart Required: Yes

Instructions:

1. Review Cisco advisory for affected versions. 2. Update to patched versions of AMP for Endpoints Windows Connector, ClamAV for Windows, or Immunet. 3. Restart affected systems after update.

🔧 Temporary Workarounds

Restrict DLL loading directories

windows

Apply directory permissions to prevent unauthorized users from writing DLL files to vulnerable search paths

icacls "C:\Program Files\Cisco\AMP\" /deny Users:(OI)(CI)W
icacls "C:\Program Files\Immunet\" /deny Users:(OI)(CI)W

Enable application control policies

windows

Use Windows AppLocker or similar to restrict which DLLs can be loaded by these applications

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from writing files to application directories
  • Monitor for suspicious DLL creation/modification in Cisco security product directories using file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check installed versions of Cisco AMP for Endpoints, ClamAV for Windows, or Immunet against vulnerable versions listed in Cisco advisory

Check Version:

For AMP: Check AMP console or connector logs. For ClamAV: clamscan --version. For Immunet: Check About in Immunet interface.

Verify Fix Applied:

Verify installed version matches or exceeds patched versions specified in Cisco advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loads from non-standard directories
  • Failed DLL load attempts from Cisco security applications
  • File creation events in Cisco application directories by non-admin users

Network Indicators:

  • Unusual outbound connections from Cisco security applications
  • Beaconing behavior from systems running affected software

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectName LIKE '%Cisco%AMP%' OR ObjectName LIKE '%Immunet%' AND Accesses CONTAINS 'WRITE_DAC' OR Accesses CONTAINS 'WRITE_OWNER'

🔗 References

📤 Share & Export