CWE
125
Advisory Published
Updated

CVE-2023-20241

First published: Wed Nov 22 2023(Updated: )

Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Anyconnect Secure Mobility Client=4.9.00086
Cisco Anyconnect Secure Mobility Client=4.9.01095
Cisco Anyconnect Secure Mobility Client=4.9.02028
Cisco Anyconnect Secure Mobility Client=4.9.03047
Cisco Anyconnect Secure Mobility Client=4.9.03049
Cisco Anyconnect Secure Mobility Client=4.9.04043
Cisco Anyconnect Secure Mobility Client=4.9.04053
Cisco Anyconnect Secure Mobility Client=4.9.05042
Cisco Anyconnect Secure Mobility Client=4.9.06037
Cisco Secure Client=4.10.00093
Cisco Secure Client=4.10.01075
Cisco Secure Client=4.10.02086
Cisco Secure Client=4.10.03104
Cisco Secure Client=4.10.04065
Cisco Secure Client=4.10.04071
Cisco Secure Client=4.10.05085
Cisco Secure Client=4.10.05095
Cisco Secure Client=4.10.05111
Cisco Secure Client=4.10.06079
Cisco Secure Client=4.10.06090
Cisco Secure Client=4.10.07061
Cisco Secure Client=4.10.07062
Cisco Secure Client=4.10.07073
Cisco Secure Client=5.0.00238
Cisco Secure Client=5.0.00529
Cisco Secure Client=5.0.00556
Cisco Secure Client=5.0.01242
Cisco Secure Client=5.0.02075
Cisco Secure Client=5.0.03072
Cisco Secure Client=5.0.03076

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for these Cisco Secure Client Software vulnerabilities?

    The vulnerability ID for these Cisco Secure Client Software vulnerabilities is CVE-2023-20241.

  • What is the severity of CVE-2023-20241?

    The severity of CVE-2023-20241 is medium, with a severity value of 5.5.

  • What is the impact of the Cisco Secure Client Software vulnerabilities?

    The impact of the Cisco Secure Client Software vulnerabilities is a denial of service (DoS) condition on an affected system.

  • Which versions of Cisco Secure Client Software are affected?

    The affected versions of Cisco Secure Client Software are 4.9.00086, 4.9.01095, 4.9.02028, 4.9.03047, 4.9.03049, 4.9.04043, 4.9.04053, 4.9.05042, 4.9.06037, 4.10.00093, 4.10.01075, 4.10.02086, 4.10.03104, 4.10.04065, 4.10.04071, 4.10.05085, 4.10.05095, 4.10.05111, 4.10.06079, 4.10.06090, 4.10.07061, 4.10.07062, 4.10.07073, 5.0.00238, 5.0.00529, 5.0.00556, 5.0.01242, 5.0.02075, 5.0.03072, and 5.0.03076.

  • How can I fix the Cisco Secure Client Software vulnerabilities?

    To fix the Cisco Secure Client Software vulnerabilities, it is recommended to upgrade to the latest version of the software provided by Cisco.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203