First published: Wed Jan 08 2020(Updated: )
A vulnerability in the inter-service communication of Cisco AnyConnect Secure Mobility Client for Android could allow an unauthenticated, local attacker to perform a service hijack attack on an affected device or cause a denial of service (DoS) condition. The vulnerability is due to the use of implicit service invocations. An attacker could exploit this vulnerability by persuading a user to install a malicious application. A successful exploit could allow the attacker to access confidential user information or cause a DoS condition on the AnyConnect application. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-anyconnect-hijack
Credit: Huan Chang.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20200108-anyconnect-hijack is classified as high due to the potential for unauthorized service hijacking and denial of service.
To fix cisco-sa-20200108-anyconnect-hijack, upgrade to the latest version of Cisco AnyConnect Secure Mobility Client available from Cisco.
Users of Cisco AnyConnect Secure Mobility Client for Android are affected by cisco-sa-20200108-anyconnect-hijack.
cisco-sa-20200108-anyconnect-hijack allows local attackers to perform service hijack attacks or cause a denial of service (DoS) condition.
No, user authentication is not required to exploit cisco-sa-20200108-anyconnect-hijack, making it particularly concerning.