First published: Fri Nov 06 2020(Updated: )
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Anyconnect Secure Mobility Client | <4.9.03047 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-27123.
The severity of CVE-2020-27123 is medium.
CVE-2020-27123 allows an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device.
Cisco AnyConnect Secure Mobility Client for Windows versions up to 4.9.03047 are affected by CVE-2020-27123.
To fix CVE-2020-27123, update Cisco AnyConnect Secure Mobility Client for Windows to a version higher than 4.9.03047.