
CVE-2021-1496 – Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities
https://notcve.org/view.php?id=CVE-2021-1496
06 May 2021 — Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see ... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6 • CWE-378: Creation of Temporary File With Insecure Permissions CWE-427: Uncontrolled Search Path Element •

CVE-2021-1429 – Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities
https://notcve.org/view.php?id=CVE-2021-1429
06 May 2021 — Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see ... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6 • CWE-378: Creation of Temporary File With Insecure Permissions CWE-427: Uncontrolled Search Path Element •

CVE-2021-1430 – Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities
https://notcve.org/view.php?id=CVE-2021-1430
06 May 2021 — Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see ... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6 • CWE-378: Creation of Temporary File With Insecure Permissions CWE-427: Uncontrolled Search Path Element •

CVE-2021-1428 – Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities
https://notcve.org/view.php?id=CVE-2021-1428
06 May 2021 — Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see ... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6 • CWE-378: Creation of Temporary File With Insecure Permissions CWE-427: Uncontrolled Search Path Element •

CVE-2021-1450 – Cisco AnyConnect Secure Mobility Client Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2021-1450
24 Feb 2021 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the device. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending one or more crafted IPC messages to the AnyConnect process on an... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-55AYyxYr • CWE-20: Improper Input Validation •

CVE-2021-1366 – Cisco AnyConnect Secure Mobility Client for Windows with VPN Posture (HostScan) Module DLL Hijacking Vulnerability
https://notcve.org/view.php?id=CVE-2021-1366
17 Feb 2021 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect proces... • https://github.com/koztkozt/CVE-2021-1366 • CWE-347: Improper Verification of Cryptographic Signature CWE-427: Uncontrolled Search Path Element •

CVE-2021-1258 – Cisco AnyConnect Secure Mobility Client Arbitrary File Read Vulnerability
https://notcve.org/view.php?id=CVE-2021-1258
13 Jan 2021 — A vulnerability in the upgrade component of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker with low privileges to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the local CLI to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying OS o... • https://kc.mcafee.com/corporate/index?page=content&id=SB10382 • CWE-264: Permissions, Privileges, and Access Controls CWE-269: Improper Privilege Management •

CVE-2021-1237 – Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability
https://notcve.org/view.php?id=CVE-2021-1237
13 Jan 2021 — A vulnerability in the Network Access Manager and Web Security Agent components of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL injection attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by inserting a configuration file i... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf • CWE-427: Uncontrolled Search Path Element •

CVE-2020-3556 – Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-3556
06 Nov 2020 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to cause a targeted AnyConnect user to execute a malicious script. The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener. A successful exploit could allow an attacker to cause the targeted AnyConnect user to execute ... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK • CWE-20: Improper Input Validation •

CVE-2020-27123 – Cisco AnyConnect Secure Mobility Client for Windows Arbitrary File Read Vulnerability
https://notcve.org/view.php?id=CVE-2020-27123
06 Nov 2020 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlyin... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-file-read-LsvDD6Uh • CWE-749: Exposed Dangerous Method or Function •