First published: Tue Mar 17 2015(Updated: )
Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to gain privileges via crafted IPC messages that trigger use of root privileges for a software-package installation, aka Bug ID CSCus79385.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure | <=4.0\(.00051\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0662 has a high severity rating due to its potential for local privilege escalation.
To fix CVE-2015-0662, update Cisco AnyConnect Secure Mobility Client to a version later than 4.0(.00051).
CVE-2015-0662 affects local users of Cisco AnyConnect Secure Mobility Client versions up to and including 4.0(.00051).
CVE-2015-0662 can enable local users to gain elevated privileges through crafted IPC messages.
If you cannot upgrade, consider limiting local access to the affected system to mitigate the risks associated with CVE-2015-0662.