
CVE-2021-1430 – Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities
https://notcve.org/view.php?id=CVE-2021-1430
06 May 2021 — Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see ... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6 • CWE-378: Creation of Temporary File With Insecure Permissions CWE-427: Uncontrolled Search Path Element •

CVE-2021-1428 – Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities
https://notcve.org/view.php?id=CVE-2021-1428
06 May 2021 — Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see ... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6 • CWE-378: Creation of Temporary File With Insecure Permissions CWE-427: Uncontrolled Search Path Element •

CVE-2021-1366 – Cisco AnyConnect Secure Mobility Client for Windows with VPN Posture (HostScan) Module DLL Hijacking Vulnerability
https://notcve.org/view.php?id=CVE-2021-1366
17 Feb 2021 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect proces... • https://github.com/koztkozt/CVE-2021-1366 • CWE-347: Improper Verification of Cryptographic Signature CWE-427: Uncontrolled Search Path Element •

CVE-2021-1258 – Cisco AnyConnect Secure Mobility Client Arbitrary File Read Vulnerability
https://notcve.org/view.php?id=CVE-2021-1258
13 Jan 2021 — A vulnerability in the upgrade component of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker with low privileges to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the local CLI to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying OS o... • https://kc.mcafee.com/corporate/index?page=content&id=SB10382 • CWE-264: Permissions, Privileges, and Access Controls CWE-269: Improper Privilege Management •

CVE-2021-1237 – Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability
https://notcve.org/view.php?id=CVE-2021-1237
13 Jan 2021 — A vulnerability in the Network Access Manager and Web Security Agent components of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL injection attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by inserting a configuration file i... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf • CWE-427: Uncontrolled Search Path Element •

CVE-2020-27123 – Cisco AnyConnect Secure Mobility Client for Windows Arbitrary File Read Vulnerability
https://notcve.org/view.php?id=CVE-2020-27123
06 Nov 2020 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlyin... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-file-read-LsvDD6Uh • CWE-749: Exposed Dangerous Method or Function •

CVE-2019-16007 – Cisco AnyConnect Secure Mobility Client for Android Service Hijack Vulnerability
https://notcve.org/view.php?id=CVE-2019-16007
23 Sep 2020 — A vulnerability in the inter-service communication of Cisco AnyConnect Secure Mobility Client for Android could allow an unauthenticated, local attacker to perform a service hijack attack on an affected device or cause a denial of service (DoS) condition. The vulnerability is due to the use of implicit service invocations. An attacker could exploit this vulnerability by persuading a user to install a malicious application. A successful exploit could allow the attacker to access confidential user information... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-anyconnect-hijack • CWE-345: Insufficient Verification of Data Authenticity •

CVE-2020-3433 – Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability
https://notcve.org/view.php?id=CVE-2020-3433
17 Aug 2020 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect ... • https://packetstorm.news/files/id/159420 • CWE-427: Uncontrolled Search Path Element •

CVE-2020-3434 – Cisco AnyConnect Secure Mobility Client for Windows Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2020-3434
17 Aug 2020 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect proc... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-feXq4tAV • CWE-20: Improper Input Validation •

CVE-2020-3435 – Cisco AnyConnect Secure Mobility Client for Windows Profile Modification Vulnerability
https://notcve.org/view.php?id=CVE-2020-3435
17 Aug 2020 — A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected ... • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-profile-7u3PERKF • CWE-20: Improper Input Validation •