Lucene search

K
ciscoCiscoCISCO-SA-20150602-CVE-2015-0761
HistoryJun 02, 2015 - 10:14 p.m.

Cisco AnyConnect Secure Mobility Client Privilege Escalation Vulnerability

2015-06-0222:14:27
tools.cisco.com
11

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the code of Cisco AnyConnect Secure Mobility Client for Linux could allow an authenticated, local attacker to elevate privileges to those of the root user.

The vulnerability is due to improper implementation of some internal functions. An attacker could exploit this vulnerability by accessing the system and calling the vpnagent with some options. An exploit could allow the attacker to obtain privileged access to the system.

Cisco has confirmed the vulnerability and released software updates.

To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These access requirements decrease the likelihood of a successful exploit.

This vulnerability can be exploited only on systems running on Linux platforms. Systems on Mac OS and Microsoft Windows platforms are not affected by this vulnerability.

Cisco would like to thank Graham Markall for reporting this vulnerability.

Affected configurations

Vulners
Node
ciscoanyconnect_secure_mobility_clientMatchany
OR
ciscoanyconnect_secure_mobility_clientMatchany

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-20150602-CVE-2015-0761