First published: Sat Aug 01 2015(Updated: )
Directory traversal vulnerability in Cisco AnyConnect Secure Mobility Client 4.0(2049) allows remote head-end systems to write to arbitrary files via a crafted configuration attribute, aka Bug ID CSCut93920.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure | =4.0\(2049\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4289 has a high severity rating due to its potential to allow unauthorized file write access.
To mitigate CVE-2015-4289, you should upgrade to a fixed version of Cisco AnyConnect Secure Mobility Client that is not affected by this vulnerability.
CVE-2015-4289 specifically affects Cisco AnyConnect Secure Mobility Client version 4.0(2049).
CVE-2015-4289 is classified as a directory traversal vulnerability that can be exploited through crafted configuration attributes.
Yes, CVE-2015-4289 can be exploited remotely by attackers through remote head-end systems.