09-09-2021 05:47 AM
In a new advisory (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444), Microsoft mentions (normal, their product) that Microsoft Defender... provide detection and protections for the known vulnerability. Also... alerts will be displayed as: “Suspicious Cpl File Execution”.
What is Cisco's behaviour in regards to this one?
Tks.
09-09-2021 09:23 AM
Our Research and Efficacy team is currently investigating this vulnerability. We'll share the findings as soon as it's available.
09-09-2021 12:48 PM
09-09-2021 01:10 PM
09-09-2021 08:25 PM
Talos mentions deploying "ClamAV signature Doc.Exploit.CVE_2012_40444-9891528-0" is this something we as AMP administrators need to do or is this already done for us?
Otherwise, it would be great if Cisco would provide some Custom Detections - Advanced Signature sets we could use in the meantime.
09-09-2021 08:47 PM
09-10-2021 04:04 PM
Is there anything to be done on Cisco AMP side? Does this vulnerability covered under Tetra signatures of Cisco AMP?
09-13-2021 08:24 AM
Also would like information regarding what needs to be done on the Cisco AMP side
09-13-2021 10:44 AM
Sorry for the delay in the response. AMP has released the following Cloud IOCs and Behavioral Protection (BP) signature since Thursday afternoon:
W32.WinwordLaunchedControl.ioc (Cloud IOC) W32.SuspiciousControl_RunDLLExecution.ioc (Cloud IOC) Suspicious Control Process Pattern (BP signature)
The details of each can be found in the Indicators page: https://console.amp.cisco.com/indicators
You might want to monitor and investigate the endpoints that triggered these events.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide