BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Cisco AnyConnect Secure Mobility Client Local Privilege Escalation

Disclosed September 19, 2013    Zeroday : 364 days

Vulnerability Description:

Cisco AnyConnect for Mac OS X uses insecure permissions for a library directory, allowing local attackers to escalate their privileges via a specially crafted, strategically placed library file.

Vendors:

Cisco

Vulnerable Software/Devices:

Cisco AnyConnect Secure Mobility Client v3.0.5080 and possibly earlier versions

Vulnerability Severity:

Medium

Exploit Availability:

Publicly Available

Exploit Impact:

Insecure Library Loading
Local attackers may place a specially crafted library file in the same folder used by AnyConnect to store library files. Because the permissions on the folder are insecure, an underprivileged attacker can place arbitrary libraries in that folder, which will then be run by AnyConnect. This allows an attacker to possibly gain access to privileged data.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 30833 - Cisco AnyConnect Secure Mobility Client Local Privilege Escalation (Zero-Day)

Mitigation:

No mitigations are currently available.

Links:

CVE(s):