First published: Wed Oct 06 2021(Updated: )
A vulnerability in the shared library loading mechanism of Cisco AnyConnect Secure Mobility Client for Linux and Mac OS could allow an authenticated, local attacker to perform a shared library hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to a race condition in the signature verification process for shared library files that are loaded on an affected device. An attacker could exploit this vulnerability by sending a series of crafted interprocess communication (IPC) messages to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected device with root privileges. To exploit this vulnerability, the attacker must have a valid account on the system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Anyconnect Secure Mobility Client | <4.10.03104 | |
Apple macOS | ||
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34788 is a vulnerability in the shared library loading mechanism of Cisco AnyConnect Secure Mobility Client for Linux and Mac OS.
The severity of CVE-2021-34788 is high with a severity value of 7.
CVE-2021-34788 affects the Cisco AnyConnect Secure Mobility Client for Linux and Mac OS if the VPN Posture (HostScan) Module is installed.
An authenticated, local attacker can exploit CVE-2021-34788 to perform a shared library hijacking attack on the affected device.
No, Apple macOS and Linux Linux kernel are not vulnerable to CVE-2021-34788.
To fix CVE-2021-34788, update the Cisco AnyConnect Secure Mobility Client to version 4.10.03104 or later.