Page 5 of 37 results (0.024 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 7

A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. • https://github.com/goichot/CVE-2020-3153 https://github.com/shubham0d/CVE-2020-3153 https://github.com/raspberry-pie/CVE-2020-3153 http://packetstormsecurity.com/files/157340/Cisco-AnyConnect-Secure-Mobility-Client-4.8.01090-Privilege-Escalation.html http://packetstormsecurity.com/files/158219/Cisco-AnyConnect-Path-Traversal-Privilege-Escalation.html http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html http://seclists.org/fulldisclosure/2020/Apr/43 https://tools.cisco.com/secur • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability. • http://www.securityfocus.com/bid/98938 http://www.securitytracker.com/id/1038627 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect • CWE-20: Improper Input Validation CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 57EXPL: 0

Cisco AnyConnect Secure Mobility Client before 4.2.05015 and 4.3.x before 4.3.02039 mishandles pathnames, which allows local users to gain privileges via a crafted INF file, aka Bug ID CSCuz92464. Cisco AnyConnect Secure Mobility Client en versiones anteriores a 4.2.05015 y 4.3.x en versiones anteriores a 4.3.02039 no maneja correctamente los nombres de ruta, lo que permite a usuarios locales obtener privilegios a través de un documento INF manipulado, también conocido como Bug ID CSCuz92464. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160824-anyconnect http://www.securityfocus.com/bid/92625 http://www.securitytracker.com/id/1036697 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.6EPSS: 0%CPEs: 52EXPL: 0

The IPC channel in Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1(8) allows local users to bypass intended access restrictions and move arbitrary files by leveraging the lack of source-path validation, aka Bug ID CSCuv48563. El canal IPC en Cisco AnyConnect Secure Mobility Client 2.0.0343 hasta la versión 4.1(8) permite a usuarios locales eludir restricciones destinadas al acceso y mover archivos arbitrarios aprovechando la falta de validación en la ruta de origen, también conocido como Bug ID CSCuv48563. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-asmc http://www.securitytracker.com/id/1033785 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 52EXPL: 2

Untrusted search path vulnerability in the CMainThread::launchDownloader function in vpndownloader.exe in Cisco AnyConnect Secure Mobility Client 2.0 through 4.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by dbghelp.dll, aka Bug ID CSCuv01279. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4211. Vulnerabilidad en la ruta de búsqueda no fiable en la función CMainThread::launchDownloader en vpndownloader.exe en Cisco AnyConnect Secure Mobility Client 2.0 hasta la versión 4.1 en Windows, permite a usuarios locales obtener privilegios a través de un troyano DLL en el directorio de trabajo actual, según lo demostrado por dbghelp.dll, también conocida como Bug ID CSCuv01279. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2015-4211. Cisco AnyConnect Secure Mobility Client version 3.1.08009 suffers from a privilege escalation vulnerability. • https://www.exploit-db.com/exploits/38289 http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html http://seclists.org/fulldisclosure/2015/Sep/80 http://tools.cisco.com/security/center/viewAlert.x?alertId=41136 http://www.securitytracker.com/id/1033643 https://code.google.com/p/google-security-research/issues/detail?id=460 • CWE-426: Untrusted Search Path •