CVE-2020-3153 – Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability
https://notcve.org/view.php?id=CVE-2020-3153
A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. • https://github.com/goichot/CVE-2020-3153 https://github.com/shubham0d/CVE-2020-3153 https://github.com/raspberry-pie/CVE-2020-3153 http://packetstormsecurity.com/files/157340/Cisco-AnyConnect-Secure-Mobility-Client-4.8.01090-Privilege-Escalation.html http://packetstormsecurity.com/files/158219/Cisco-AnyConnect-Path-Traversal-Privilege-Escalation.html http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html http://seclists.org/fulldisclosure/2020/Apr/43 https://tools.cisco.com/secur • CWE-427: Uncontrolled Search Path Element •
CVE-2017-6638
https://notcve.org/view.php?id=CVE-2017-6638
A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability. • http://www.securityfocus.com/bid/98938 http://www.securitytracker.com/id/1038627 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect • CWE-20: Improper Input Validation CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-0761
https://notcve.org/view.php?id=CVE-2015-0761
Cisco AnyConnect Secure Mobility Client before 3.1(8009) and 4.x before 4.0(2052) on Linux does not properly implement unspecified internal functions, which allows local users to obtain root privileges via crafted vpnagent options, aka Bug ID CSCus86790. Cisco AnyConnect Secure Mobility Client anterior a 3.1(8009) y 4.x anterior a 4.0(2052) en Linux no implementa correctamente las funciones internas no especificadas, lo que permite a usuarios locales obtener privilegios root a través de opciones vpnagent manipuladas, también conocido como Bug ID CSCus86790. • http://tools.cisco.com/security/center/viewAlert.x?alertId=39158 http://www.securityfocus.com/bid/74954 http://www.securitytracker.com/id/1032472 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-0664
https://notcve.org/view.php?id=CVE-2015-0664
The IPC channel in Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to write to arbitrary userspace memory locations, and consequently gain privileges, via crafted messages, aka Bug ID CSCus79195. El canal IPC en Cisco AnyConnect Secure Mobility Client 4.0(.00051) y anteriores permite a usuarios locales escribir a localizaciones de memoria de espacios de usuarios arbitrarias, y como consecuencia ganar privilegios, a través de mensajes manipulados, también conocido como Bug ID CSCus79195. • http://tools.cisco.com/security/center/viewAlert.x?alertId=37861 http://www.securitytracker.com/id/1031932 • CWE-20: Improper Input Validation •
CVE-2015-0663
https://notcve.org/view.php?id=CVE-2015-0663
Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier does not properly implement access control for IPC messages, which allows local users to write to arbitrary files via crafted messages, aka Bug ID CSCus79392. Cisco AnyConnect Secure Mobility Client 4.0(.00051) y anteriores no implementa adecuadamente el control de acceso para mensajes IPC, lo que permite a usuarios locales escribir en archivos arbitrarios a través de mensajes modificados, también conocido como Bug ID CSCus79392. • http://tools.cisco.com/security/center/viewAlert.x?alertId=37863 http://www.securitytracker.com/id/1031930 • CWE-264: Permissions, Privileges, and Access Controls •