First published: Wed Jun 16 2021(Updated: )
A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to uncontrolled memory allocation. An attacker could exploit this vulnerability by copying a crafted file to a specific folder on the system. A successful exploit could allow the attacker to crash the VPN Agent service when the affected application is launched, causing it to be unavailable to all users of the system. To exploit this vulnerability, the attacker must have valid credentials on a multiuser Windows system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-hMhyDfb8
Credit: Skylake.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure Mobility Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-anyconnect-dos-hMhyDfb8 vulnerability is considered a critical denial of service (DoS) issue.
To remediate cisco-sa-anyconnect-dos-hMhyDfb8, update the Cisco AnyConnect Secure Mobility Client to the latest version provided by Cisco.
The cisco-sa-anyconnect-dos-hMhyDfb8 vulnerability can be exploited by an authenticated local attacker.
The cisco-sa-anyconnect-dos-hMhyDfb8 vulnerability is caused by uncontrolled memory allocation in the Cisco AnyConnect Secure Mobility Client.
The cisco-sa-anyconnect-dos-hMhyDfb8 vulnerability affects systems running the Cisco AnyConnect Secure Mobility Client for Windows.