First published: Thu Jun 04 2015(Updated: )
Cisco AnyConnect Secure Mobility Client before 3.1(8009) and 4.x before 4.0(2052) on Linux does not properly implement unspecified internal functions, which allows local users to obtain root privileges via crafted vpnagent options, aka Bug ID CSCus86790.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure | <=3.1\(.07021\) | |
Cisco AnyConnect Secure | =4.0\(.00048\) | |
Cisco AnyConnect Secure | =4.0\(.00051\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0761 is categorized as a high-severity vulnerability due to its potential to allow local users to gain root privileges.
To fix CVE-2015-0761, users should upgrade to Cisco AnyConnect Secure Mobility Client version 3.1(8009) or 4.0(2052) or later.
CVE-2015-0761 affects Cisco AnyConnect Secure Mobility Client versions prior to 3.1(8009) and 4.x before 4.0(2052) on Linux.
Local users on systems running the affected versions of Cisco AnyConnect Secure Mobility Client on Linux are vulnerable to CVE-2015-0761.
The exploit type for CVE-2015-0761 involves obtaining root privileges through crafted vpnagent options.