First published: Wed Mar 06 2024(Updated: )
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-20337 has been classified with a severity rating that may allow remote attackers to exploit the vulnerability.
To mitigate CVE-2024-20337, users should apply the latest security patch provided by Cisco for the Secure Client.
CVE-2024-20337 affects users of Cisco Secure Client specifically using the vulnerable SAML authentication process.
CVE-2024-20337 can enable attackers to perform a carriage return line feed (CRLF) injection attack.
Yes, CVE-2024-20337 can be exploited by unauthenticated remote attackers against targeted users.