Lucene search

K
saintSAINT CorporationSAINT:15A08DBA0229CD659FF8661F86E395F3
HistoryJun 13, 2011 - 12:00 a.m.

Cisco AnyConnect Secure Mobility Client VPNWeb ActiveX Code Execution

2011-06-1300:00:00
SAINT Corporation
www.saintcorporation.com
28

0.686 Medium

EPSS

Percentile

97.7%

Added: 06/13/2011
CVE: CVE-2011-2039
BID: 48081
OSVDB: 72714

Background

Cisco AnyConnect Secure Mobility Client provides remote mobile users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software.

Problem

The AnyConnect Secure Mobility Client web deployment package uses an ActiveX control (**vpnweb.ocx**) to download and start the downloader application for the Secure Mobility Client application. A remote code execution vulnerability exists in the **vpnweb.ocx** ActiveX control because it fails to properly validate the authenticity of the downloaded executable when the client is deployed from the VPN headend. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted web page.

Resolution

Cisco has released free software updates that address these vulnerabilities.

References

<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=909&gt;
<http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml&gt;

Limitations

Exploit works on Cisco Systems AnyConnect Secure Mobility Client For Windows 2.3.0254.

The HTML page of the exploit must be opened using Internet Explorer 7 or 8 on the target.

Platforms

Windows

0.686 Medium

EPSS

Percentile

97.7%