CWE
20
Advisory Published
CVE Published
Updated

CVE-2012-2494: Input Validation

First published: Wed Jun 20 2012(Updated: )

The VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 2.x before 2.5 MR6 and 3.x before 3.0 MR8 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtw48681.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco AnyConnect Secure=2.0
Cisco AnyConnect Secure=2.1
Cisco AnyConnect Secure=2.2
Cisco AnyConnect Secure=2.2.128
Cisco AnyConnect Secure=2.2.133
Cisco AnyConnect Secure=2.2.136
Cisco AnyConnect Secure=2.2.140
Cisco AnyConnect Secure=2.3
Cisco AnyConnect Secure=2.3.185
Cisco AnyConnect Secure=2.3.254
Cisco AnyConnect Secure=2.3.2016
Cisco AnyConnect Secure=2.4
Cisco AnyConnect Secure=2.4.0202
Cisco AnyConnect Secure=2.4.1012
Cisco AnyConnect Secure=2.5
Cisco AnyConnect Secure=3.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2012-2494?

    CVE-2012-2494 is rated as a high severity vulnerability that allows attackers to force a version downgrade of the Cisco AnyConnect Secure Mobility Client.

  • How do I fix CVE-2012-2494?

    To mitigate CVE-2012-2494, upgrade to Cisco AnyConnect Secure Mobility Client version 2.5 MR6 or 3.0 MR8 or later.

  • What versions of Cisco AnyConnect Secure Mobility Client are affected by CVE-2012-2494?

    CVE-2012-2494 affects Cisco AnyConnect Secure Mobility Client versions 2.0 through 2.4 and 3.0 prior to MR8.

  • Can CVE-2012-2494 be exploited remotely?

    Yes, CVE-2012-2494 can be exploited remotely, allowing attackers to downgrade the software without local access.

  • Does CVE-2012-2494 impact system security?

    Yes, exploiting CVE-2012-2494 can compromise system security by downgrading the client to a less secure version.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203