First published: Mon Aug 06 2012(Updated: )
Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.08066 does not ensure that authentication makes use of a legitimate certificate, which allows user-assisted man-in-the-middle attackers to spoof servers via a crafted certificate, aka Bug ID CSCtz29197.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure | =3.0 | |
Cisco AnyConnect Secure | =3.0.0629 | |
Cisco AnyConnect Secure | =3.0.07059 | |
Cisco AnyConnect Secure | =3.0.08057 | |
Cisco AnyConnect Secure | =3.0.08066 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2498 is classified as a medium-severity vulnerability that may allow man-in-the-middle attacks.
To mitigate CVE-2012-2498, users should upgrade the Cisco AnyConnect Secure Mobility Client to a version that addresses the issue.
CVE-2012-2498 affects Cisco AnyConnect Secure Mobility Client versions 3.0 through 3.0.08066.
Exploitation of CVE-2012-2498 requires user assistance, as it involves spoofing through a crafted certificate.
CVE-2012-2498 allows attackers to perform man-in-the-middle attacks by spoofing servers.