First published: Thu Jun 07 2018(Updated: )
A vulnerability in the certificate management subsystem of Cisco AnyConnect Network Access Manager and of Cisco AnyConnect Secure Mobility Client for iOS, Mac OS X, Android, Windows, and Linux could allow an unauthenticated, remote attacker to bypass the TLS certificate check when downloading certain configuration files. The vulnerability is due to improper use of Simple Certificate Enrollment Protocol and improper server certificate validation. An attacker could exploit this vulnerability by preparing malicious profile and localization files for Cisco AnyConnect to use. A successful exploit could allow the attacker to remotely change the configuration profile, a certificate, or the localization data used by AnyConnect Secure Mobility Client. Cisco Bug IDs: CSCvh23141.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Anyconnect Secure Mobility Client | =4.6\(100\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-0334.
The severity of CVE-2018-0334 is medium with a severity value of 4.8.
Cisco AnyConnect Secure Mobility Client version 4.6 (100) is affected by CVE-2018-0334.
An unauthenticated remote attacker can exploit CVE-2018-0334 by bypassing the TLS certificate check when downloading certain files.
Yes, the following references are available for CVE-2018-0334: [link1](http://www.securityfocus.com/bid/104430), [link2](http://www.securitytracker.com/id/1041075), [link3](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-AnyConnect-cert-bypass).