First published: Wed Mar 06 2024(Updated: )
A vulnerability in the ISE Posture (System Scan) module of Cisco Secure Client for Linux could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to the use of an uncontrolled search path element. An attacker could exploit this vulnerability by copying a malicious library file to a specific directory in the filesystem and persuading an administrator to restart a specific process. A successful exploit could allow the attacker to execute arbitrary code on an affected device with root privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20338 is rated as a high-severity vulnerability due to its potential to allow privilege escalation.
To fix CVE-2024-20338, update to the latest version of Cisco Secure Client that addresses this vulnerability.
CVE-2024-20338 affects authenticated users of Cisco Secure Client for Linux who can access the system.
The impact of CVE-2024-20338 includes the possibility for local, authenticated attackers to elevate their privileges on the affected device.
You can identify if your system is vulnerable to CVE-2024-20338 by checking if you are using an affected version of Cisco Secure Client for Linux.