CVE-2017-3813 – Cisco AnyConnect Secure Mobility Client 4.3.04027 - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2017-3813
A vulnerability in the Start Before Logon (SBL) module of Cisco AnyConnect Secure Mobility Client Software for Windows could allow an unauthenticated, local attacker to open Internet Explorer with the privileges of the SYSTEM user. The vulnerability is due to insufficient implementation of the access controls. An attacker could exploit this vulnerability by opening the Internet Explorer browser. An exploit could allow the attacker to use Internet Explorer with the privileges of the SYSTEM user. This may allow the attacker to execute privileged commands on the targeted system. • https://www.exploit-db.com/exploits/41476 http://www.securityfocus.com/bid/96145 http://www.securitytracker.com/id/1037796 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-anyconnect • CWE-264: Permissions, Privileges, and Access Controls CWE-862: Missing Authorization •
CVE-2016-9192
https://notcve.org/view.php?id=CVE-2016-9192
A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM account. More Information: CSCvb68043. Known Affected Releases: 4.3(2039) 4.3(748). Known Fixed Releases: 4.3(4019) 4.4(225). Una vulnerabilidad en Cisco AnyConnect Secure Mobility Client para Windows podría permitir a un atacante local autenticado instalar y ejecutar un archivo ejecutable con privilegios equivalentes a la cuenta SYSTEM del sistema operativo Microsoft Windows. • http://www.securityfocus.com/bid/94770 http://www.securitytracker.com/id/1037409 https://github.com/nettitude/PoshC2/blob/master/Modules/CVE-2016-9192.ps1 https://github.com/serializingme/cve-2016-9192 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-anyconnect1 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2016-6369
https://notcve.org/view.php?id=CVE-2016-6369
Cisco AnyConnect Secure Mobility Client before 4.2.05015 and 4.3.x before 4.3.02039 mishandles pathnames, which allows local users to gain privileges via a crafted INF file, aka Bug ID CSCuz92464. Cisco AnyConnect Secure Mobility Client en versiones anteriores a 4.2.05015 y 4.3.x en versiones anteriores a 4.3.02039 no maneja correctamente los nombres de ruta, lo que permite a usuarios locales obtener privilegios a través de un documento INF manipulado, también conocido como Bug ID CSCuz92464. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160824-anyconnect http://www.securityfocus.com/bid/92625 http://www.securitytracker.com/id/1036697 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-6322
https://notcve.org/view.php?id=CVE-2015-6322
The IPC channel in Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1(8) allows local users to bypass intended access restrictions and move arbitrary files by leveraging the lack of source-path validation, aka Bug ID CSCuv48563. El canal IPC en Cisco AnyConnect Secure Mobility Client 2.0.0343 hasta la versión 4.1(8) permite a usuarios locales eludir restricciones destinadas al acceso y mover archivos arbitrarios aprovechando la falta de validación en la ruta de origen, también conocido como Bug ID CSCuv48563. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-asmc http://www.securitytracker.com/id/1033785 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-6306 – Cisco AnyConnect 3.1.08009 - Local Privilege Escalation (via DMG Install Script)
https://notcve.org/view.php?id=CVE-2015-6306
Cisco AnyConnect Secure Mobility Client 4.1(8) on OS X and Linux does not verify pathnames before installation actions, which allows local users to obtain root privileges via a crafted installation file, aka Bug ID CSCuv11947. Vulnerabilidad en Cisco AnyConnect Secure Mobility Client 4.1(8) en OS X y Linux, no verifica los nombres de ruta antes de las acciones de instalación, lo que permite a usuarios locales obtener privilegios de root a través de archivos de instalación manipulados, también conocida como Bug ID CSCuv11947. • https://www.exploit-db.com/exploits/38303 http://packetstormsecurity.com/files/133685/Cisco-AnyConnect-DMG-Install-Script-Privilege-Escalation.html http://seclists.org/fulldisclosure/2015/Sep/86 http://tools.cisco.com/security/center/viewAlert.x?alertId=41135 http://www.securityfocus.com/archive/1/536534/100/0/threaded http://www.securitytracker.com/id/1033656 https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_%20of_privileges_via_dmg_install_script.html • CWE-264: Permissions, Privileges, and Access Controls •