Page 3 of 34 results (0.008 seconds)

CVSS: 6.5EPSS: 41%CPEs: 1EXPL: 10

19 Feb 2020 — A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system ... • https://packetstorm.news/files/id/159420 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

08 Jun 2017 — A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful explo... • http://www.securityfocus.com/bid/98938 • CWE-20: Improper Input Validation CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 31%CPEs: 20EXPL: 1

14 Dec 2016 — A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM account. More Information: CSCvb68043. Known Affected Releases: 4.3(2039) 4.3(748). Known Fixed Releases: 4.3(4019) 4.4(225). Una vulnerabilidad en Cisco AnyConnect Secure Mobility Client para Windows podría permitir a un atacante local autenticado instalar y ejecutar... • https://github.com/serializingme/cve-2016-9192 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 57EXPL: 0

25 Aug 2016 — Cisco AnyConnect Secure Mobility Client before 4.2.05015 and 4.3.x before 4.3.02039 mishandles pathnames, which allows local users to gain privileges via a crafted INF file, aka Bug ID CSCuz92464. Cisco AnyConnect Secure Mobility Client en versiones anteriores a 4.2.05015 y 4.3.x en versiones anteriores a 4.3.02039 no maneja correctamente los nombres de ruta, lo que permite a usuarios locales obtener privilegios a través de un documento INF manipulado, también conocido como Bug ID CSCuz92464. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160824-anyconnect • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.1EPSS: 0%CPEs: 52EXPL: 0

12 Oct 2015 — The IPC channel in Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1(8) allows local users to bypass intended access restrictions and move arbitrary files by leveraging the lack of source-path validation, aka Bug ID CSCuv48563. El canal IPC en Cisco AnyConnect Secure Mobility Client 2.0.0343 hasta la versión 4.1(8) permite a usuarios locales eludir restricciones destinadas al acceso y mover archivos arbitrarios aprovechando la falta de validación en la ruta de origen, también conocido como Bug ID... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-asmc • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.3EPSS: 5%CPEs: 52EXPL: 4

23 Sep 2015 — Untrusted search path vulnerability in the CMainThread::launchDownloader function in vpndownloader.exe in Cisco AnyConnect Secure Mobility Client 2.0 through 4.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by dbghelp.dll, aka Bug ID CSCuv01279. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4211. Vulnerabilidad en la ruta de búsqueda no fiable en la función CMainThread::launchDownloader en vpndownloader.... • https://packetstorm.news/files/id/133876 • CWE-426: Untrusted Search Path •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 Aug 2015 — Directory traversal vulnerability in Cisco AnyConnect Secure Mobility Client 4.0(2049) allows remote head-end systems to write to arbitrary files via a crafted configuration attribute, aka Bug ID CSCut93920. Vulnerabilidad de salto de directorio en Cisco AnyConnect Secure Mobility Client 4.0(2049), permite a sistemas de cabecera remotos escribir en archivos arbitrarios a través de un atributo de configuración manipulado, también conocida como Bug ID CSCut93920. • http://tools.cisco.com/security/center/viewAlert.x?alertId=40175 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

29 Jul 2015 — The kernel extension in Cisco AnyConnect Secure Mobility Client 4.0(2049) on OS X allows local users to cause a denial of service (panic) via vectors involving contiguous memory locations, aka Bug ID CSCut12255. Vulnerabilidad en la extensión del kernel en Cisco AnyConnect Secure Mobility Client 4.0(2049) en OS X, permite a usuarios locales causar una denegación de servicio (pánico) a través de vectores que involucran ubicaciones contiguas de memoria, también conocida como Bug ID CSCut12255. • http://tools.cisco.com/security/center/viewAlert.x?alertId=40176 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

04 Jun 2015 — Cisco AnyConnect Secure Mobility Client before 3.1(8009) and 4.x before 4.0(2052) on Linux does not properly implement unspecified internal functions, which allows local users to obtain root privileges via crafted vpnagent options, aka Bug ID CSCus86790. Cisco AnyConnect Secure Mobility Client anterior a 3.1(8009) y 4.x anterior a 4.0(2052) en Linux no implementa correctamente las funciones internas no especificadas, lo que permite a usuarios locales obtener privilegios root a través de opciones vpnagent ma... • http://tools.cisco.com/security/center/viewAlert.x?alertId=39158 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

29 May 2015 — The Posture module for Cisco Identity Services Engine (ISE), as distributed in Cisco AnyConnect Secure Mobility Client 4.0(64), allows local users to gain privileges via unspecified commands, aka Bug ID CSCut05797. El módulo Posture para Cisco Identity Services Engine (ISE), distribuido en Cisco AnyConnect Secure Mobility Client 4.0(64), permite a usuarios locales ganar privilegios a través de comandos no especificados, también conocido como Bug ID CSCut05797. • http://tools.cisco.com/security/center/viewAlert.x?alertId=39018 • CWE-284: Improper Access Control •