First published: Thu Oct 05 2017(Updated: )
A vulnerability in the Network Access Manager (NAM) of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker to enable multiple network adapters, aka a Dual-Homed Interface vulnerability. The vulnerability is due to insufficient NAM policy enforcement. An attacker could exploit this vulnerability by manipulating network interfaces of the device to allow multiple active network interfaces. A successful exploit could allow the attacker to send traffic over a non-authorized network interface. Cisco Bug IDs: CSCvf66539.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect | =4.5\(822\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12268 is rated as Medium severity due to its potential exploitation by an authenticated local attacker.
To remediate CVE-2017-12268, update to the fixed version of Cisco AnyConnect Secure Mobility Client 4.5(823) or later.
CVE-2017-12268 affects users of Cisco AnyConnect Secure Mobility Client version 4.5(822) on vulnerable systems.
CVE-2017-12268 can be exploited by an authenticated local attacker to manipulate network adapter configurations.
The vulnerability in CVE-2017-12268 specifically involves the Network Access Manager (NAM) component of Cisco AnyConnect Secure Mobility Client.