First published: Wed May 15 2024(Updated: )
A vulnerability in the Network Access Manager (NAM) module of Cisco Secure Client could allow an unauthenticated attacker with physical access to an affected device to elevate privileges to SYSTEM. This vulnerability is due to a lack of authentication on a specific function. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20391 has a medium severity rating due to its potential for privilege escalation.
To fix CVE-2024-20391, update to the latest version of Cisco Secure Client that addresses this vulnerability.
CVE-2024-20391 affects any device running an unpatched version of Cisco Secure Client that uses the Network Access Manager module.
CVE-2024-20391 can be exploited through a local attack where an unauthenticated user with physical access can elevate privileges.
Exploitation of CVE-2024-20391 can lead to unauthorized access and control over the affected device at the SYSTEM level.