First published: Thu Feb 22 2007(Updated: )
Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client use an insecure default Discretionary Access Control Lists (DACL) for the connection client GUI, which allows local users to gain privileges by injecting "a thread under ConnectionClient.exe," aka CSCsg20558.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Trust Agent | =2.0 | |
Cisco Security Agent | =5.1 | |
Cisco Security Agent | =5.0 | |
Cisco Secure | =4.0.51 | |
Cisco Secure | =4.0 | |
Cisco Trust Agent | =2.0.1 | |
Meetinghouse AEGIS SecureConnect Client | =windows_platform | |
Cisco Trust Agent | =2.1 | |
Cisco Trust Agent | =1.0 | |
Cisco Secure | =4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1066 has a medium severity rating due to its potential impact on system security.
To fix CVE-2007-1066, update the affected Cisco software to the latest patched version provided by Cisco.
CVE-2007-1066 affects Cisco Secure Services Client 4.x, Trust Agent 1.x and 2.x, and Cisco Security Agent 5.0 and 5.1.
CVE-2007-1066 is a vulnerability related to insecure default Discretionary Access Control Lists (DACL) in certain Cisco products.
Currently, the recommended mitigation for CVE-2007-1066 is to apply the necessary software updates from Cisco.