First published: Wed Jan 13 2021(Updated: )
A vulnerability in the upgrade component of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker with low privileges to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the local CLI to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying OS of the affected device. The attacker would need to have valid user credentials to exploit this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Anyconnect Secure Mobility Client | <4.9.03047 | |
Cisco Anyconnect Secure Mobility Client | <4.9.03047 | |
Cisco Anyconnect Secure Mobility Client | <4.9.03049 | |
Mcafee Agent Epolicy Orchestrator Extension | <5.7.6 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1258.
The severity of CVE-2021-1258 is medium with a CVSS score of 5.5.
Cisco AnyConnect Secure Mobility Client versions up to 4.9.03047 for Linux, macOS, and Windows are affected, as well as McAfee Agent ePolicy Orchestrator Extension version up to 5.7.6.
An authenticated, local attacker with low privileges can exploit CVE-2021-1258 to read arbitrary files on the underlying operating system.
No, Microsoft Windows systems are not vulnerable to CVE-2021-1258.
You can find more information about CVE-2021-1258 on the following websites: [McAfee Security Bulletin SB10382](https://kc.mcafee.com/corporate/index?page=content&id=SB10382) and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-fileread-PbHbgHMj).