Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on May 18, 2021, 06:15:58 PM

Title: Cisco Security Advisory - Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability
Post by: Netwörkheäd on May 18, 2021, 06:15:58 PM
Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to cause a targeted AnyConnect user to execute a malicious script.


The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener. A successful exploit could allow an attacker to cause the targeted AnyConnect user to execute a script. This script would execute with the privileges of the targeted AnyConnect user.


Note: To successfully exploit this vulnerability, an attacker would need all of the following:



Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.


This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK



     
         
Security Impact Rating:  High
   
   
       
CVE: CVE-2020-3556
Source: Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20AnyConnect%20Secure%20Mobility%20Client%20Arbitrary%20Code%20Execution%20Vulnerability&vs_k=1)