First published: Fri Sep 20 2013(Updated: )
Cisco AnyConnect Secure Mobility Client on Mac OS X uses weak permissions for a library directory, which allows local users to gain privileges via a crafted library file, aka Bug ID CSCue33619.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure | ||
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1130 is classified as a high-severity vulnerability due to the potential for local privilege escalation.
To mitigate CVE-2013-1130, ensure that the permissions on the library directory used by Cisco AnyConnect are appropriately restricted.
CVE-2013-1130 affects users of Cisco AnyConnect Secure Mobility Client on Mac OS X with misconfigured library directory permissions.
CVE-2013-1130 can be exploited by local users to escalate their privileges through crafted library files.
Yes, Cisco has released updates for the AnyConnect Secure Mobility Client to address the vulnerabilities associated with CVE-2013-1130.