7.2
CWE
426
Advisory Published
Updated

CVE-2015-6305

First published: Fri Sep 25 2015(Updated: )

Untrusted search path vulnerability in the CMainThread::launchDownloader function in vpndownloader.exe in Cisco AnyConnect Secure Mobility Client 2.0 through 4.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by dbghelp.dll, aka Bug ID CSCuv01279. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4211.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco AnyConnect Secure=2.0.0343
Cisco AnyConnect Secure=2.1.0.148
Cisco AnyConnect Secure=2.2.0133
Cisco AnyConnect Secure=2.2.0136
Cisco AnyConnect Secure=2.2.0140
Cisco AnyConnect Secure=2.3.0185
Cisco AnyConnect Secure=2.3.0254
Cisco AnyConnect Secure=2.3.1003
Cisco AnyConnect Secure=2.3.2016
Cisco AnyConnect Secure=2.4.0202
Cisco AnyConnect Secure=2.4.1012
Cisco AnyConnect Secure=2.5.0217
Cisco AnyConnect Secure=2.5.2006
Cisco AnyConnect Secure=2.5.2010
Cisco AnyConnect Secure=2.5.2011
Cisco AnyConnect Secure=2.5.2014
Cisco AnyConnect Secure=2.5.2017
Cisco AnyConnect Secure=2.5.2018
Cisco AnyConnect Secure=2.5.2019
Cisco AnyConnect Secure=2.5.3041
Cisco AnyConnect Secure=2.5.3046
Cisco AnyConnect Secure=2.5.3051
Cisco AnyConnect Secure=2.5.3054
Cisco AnyConnect Secure=2.5.3055
Cisco AnyConnect Secure=2.5_base
Cisco AnyConnect Secure=3.0.0
Cisco AnyConnect Secure=3.0.0629
Cisco AnyConnect Secure=3.0.1047
Cisco AnyConnect Secure=3.0.2052
Cisco AnyConnect Secure=3.0.3050
Cisco AnyConnect Secure=3.0.3054
Cisco AnyConnect Secure=3.0.4235
Cisco AnyConnect Secure=3.0.5075
Cisco AnyConnect Secure=3.0.5080
Cisco AnyConnect Secure=3.0.09231
Cisco AnyConnect Secure=3.0.09266
Cisco AnyConnect Secure=3.0.09353
Cisco AnyConnect Secure=3.1\(60\)
Cisco AnyConnect Secure=3.1.0
Cisco AnyConnect Secure=3.1.02043
Cisco AnyConnect Secure=3.1.05182
Cisco AnyConnect Secure=3.1.05187
Cisco AnyConnect Secure=3.1.06073
Cisco AnyConnect Secure=3.1.07021
Cisco AnyConnect Secure=4.0\(48\)
Cisco AnyConnect Secure=4.0\(64\)
Cisco AnyConnect Secure=4.0\(2049\)
Cisco AnyConnect Secure=4.0.0
Cisco AnyConnect Secure=4.0.00048
Cisco AnyConnect Secure=4.0.00051
Cisco AnyConnect Secure=4.1.0
Microsoft Windows Operating System

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2015-6305?

    CVE-2015-6305 is considered a medium severity vulnerability that allows local users to gain elevated privileges.

  • How do I fix CVE-2015-6305?

    To fix CVE-2015-6305, ensure that you update Cisco AnyConnect Secure Mobility Client to the latest version provided by Cisco.

  • Which versions of Cisco AnyConnect are affected by CVE-2015-6305?

    CVE-2015-6305 affects Cisco AnyConnect Secure Mobility Client versions ranging from 2.0 through 4.1.

  • Can CVE-2015-6305 be exploited remotely?

    No, CVE-2015-6305 requires local access to the vulnerable system to exploit the untrusted search path vulnerability.

  • What is the impact of CVE-2015-6305 on affected systems?

    The impact of CVE-2015-6305 allows local users to execute a Trojan horse DLL in the current working directory, leading to potential privilege escalation.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203