CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
25.6%
A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established.
This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | anyconnect_secure_mobility_client | * | cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:* |
cisco | secure_client | * | cpe:2.3:a:cisco:secure_client:*:*:*:*:*:windows:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco Secure Client",
"versions": [
{
"version": "4.9.00086",
"status": "affected"
},
{
"version": "4.9.01095",
"status": "affected"
},
{
"version": "4.9.02028",
"status": "affected"
},
{
"version": "4.9.03047",
"status": "affected"
},
{
"version": "4.9.03049",
"status": "affected"
},
{
"version": "4.9.04043",
"status": "affected"
},
{
"version": "4.9.04053",
"status": "affected"
},
{
"version": "4.9.05042",
"status": "affected"
},
{
"version": "4.9.06037",
"status": "affected"
},
{
"version": "4.10.00093",
"status": "affected"
},
{
"version": "4.10.01075",
"status": "affected"
},
{
"version": "4.10.02086",
"status": "affected"
},
{
"version": "4.10.03104",
"status": "affected"
},
{
"version": "4.10.04065",
"status": "affected"
},
{
"version": "4.10.04071",
"status": "affected"
},
{
"version": "4.10.05085",
"status": "affected"
},
{
"version": "4.10.05095",
"status": "affected"
},
{
"version": "4.10.05111",
"status": "affected"
},
{
"version": "4.10.06079",
"status": "affected"
},
{
"version": "4.10.06090",
"status": "affected"
},
{
"version": "5.0.00238",
"status": "affected"
},
{
"version": "5.0.00529",
"status": "affected"
},
{
"version": "5.0.00556",
"status": "affected"
},
{
"version": "5.0.01242",
"status": "affected"
}
]
}
]
More