First published: Mon Aug 17 2020(Updated: )
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Anyconnect Secure Mobility Client | <4.9.00086 | |
Cisco AnyConnect Secure | ||
<4.9.00086 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3433 is a vulnerability in Cisco AnyConnect Secure Mobility Client for Windows that allows for DLL hijacking.
The severity of CVE-2020-3433 is not specified in the provided information.
Users of Cisco AnyConnect Secure Mobility Client for Windows are affected by CVE-2020-3433.
CVE-2020-3433 allows an attacker with valid credentials to execute code on the affected machine with SYSTEM privileges by exploiting a DLL hijacking vulnerability.
To fix CVE-2020-3433, it is recommended to update to the latest version of Cisco AnyConnect Secure Mobility Client for Windows or apply the security patch provided by Cisco.