First published: Wed Jun 28 2023(Updated: )
A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established. This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Anyconnect Secure Mobility Client | <4.10.07061 | |
Cisco Secure Client | <5.0.02075 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco AnyConnect vulnerability is CVE-2023-20178.
The severity level of CVE-2023-20178 is high with a CVSS score of 7.8.
The Cisco AnyConnect Secure Mobility Client Software for Windows versions up to and excluding 4.10.07061, and Cisco Secure Client Software for Windows versions up to and excluding 5.0.02075 are affected by CVE-2023-20178.
CVE-2023-20178 is a vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows, allowing a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM.
To fix CVE-2023-20178, it is recommended to apply the necessary security updates provided by Cisco.