First published: Thu Jun 02 2011(Updated: )
The helper application in Cisco AnyConnect Secure Mobility Client (formerly AnyConnect VPN Client) before 2.3.185 on Windows, and on Windows Mobile, downloads a client executable file (vpndownloader.exe) without verifying its authenticity, which allows remote attackers to execute arbitrary code via the url property to a certain ActiveX control in vpnweb.ocx, aka Bug ID CSCsy00904.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect | <=2.3 | |
Cisco AnyConnect | =2.0 | |
Cisco AnyConnect | =2.1 | |
Cisco AnyConnect | =2.2 | |
Cisco AnyConnect | =2.2.128 | |
Cisco AnyConnect | =2.2.133 | |
Cisco AnyConnect | =2.2.136 | |
Cisco AnyConnect | =2.2.140 | |
Microsoft Windows | ||
Windows Mobile Connectivity Tools |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2039 is classified as a medium severity vulnerability due to the potential for remote code execution.
To fix CVE-2011-2039, upgrade the Cisco AnyConnect Secure Mobility Client to the latest version available.
CVE-2011-2039 affects Cisco AnyConnect Secure Mobility Client versions prior to 2.3.185.
CVE-2011-2039 allows remote attackers to execute arbitrary code by exploiting the lack of authenticity verification in a downloaded executable.
Yes, CVE-2011-2039 also affects users on Windows Mobile using the vulnerable version of Cisco AnyConnect.