First published: Thu Jan 18 2018(Updated: )
A vulnerability in the Profile Editor of the Cisco AnyConnect Secure Mobility Client could allow an unauthenticated, local attacker to have read and write access to information stored in the affected system. The vulnerability is due to improper handling of the XML External Entity (XXE) entries when parsing an XML file. An attacker could exploit this vulnerability by injecting a crafted XML file with malicious entries, which could allow the attacker to read and write files. Cisco Bug IDs: CSCvg19341.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Anyconnect Secure Mobility Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco AnyConnect Secure Mobility Client vulnerability is CVE-2018-0100.
The severity level of CVE-2018-0100 is medium, with a severity value of 4.4.
The affected software for CVE-2018-0100 is Cisco AnyConnect Secure Mobility Client.
An unauthenticated, local attacker can exploit CVE-2018-0100 to have read and write access to information stored in the system.
You can find more information about CVE-2018-0100 on the following websites: [securityfocus.com](http://www.securityfocus.com/bid/102738), [securitytracker.com](http://www.securitytracker.com/id/1040246), and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-acpe).