CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:P/A:N
EPSS
Percentile
35.5%
Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to conduct man-in-the-middle attacks.
The vulnerability is due insufficient validation of certificates to be accepted by end users. An unauthenticated, remote attacker can exploit this vulnerability to impersonate trusted servers via crafted certificates. If successful, the attacker could launch further attacks.
Cisco has confirmed this vulnerability and released software updates.
Exploits of this vulnerability may require user interaction. An attacker could convince a user to visit a malicious website using a certificate that may be displayed as valid for a legitimate site. In addition, the user must be connected via the Cisco AnyConnect Secure Mobility Client for an attacker to have an attack vector to exploit this vulnerability.
Cisco indicates through the CVSS score that proof-of-concept exploit code exists; however, the code is not known to be publicly available.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | anyconnect_secure_mobility_client | any | cpe:2.3:a:cisco:anyconnect_secure_mobility_client:any:*:*:*:*:*:*:* |