First published: Wed Nov 03 2021(Updated: )
A vulnerability in the Network Access Manager (NAM) module of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to incorrect privilege assignment to scripts executed before user logon. An attacker could exploit this vulnerability by configuring a script to be executed before logon. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-nam-priv-yCsRNUGT
Credit: Jacob Griffith Huntington National Bank
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Anyconnect Secure Mobility Client | =Earlier than 4.10.03104<4.10.03104 | 4.10.03104 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco AnyConnect vulnerability is cisco-sa-anyconnect-nam-priv-yCsRNUGT.
The title of this vulnerability is Cisco AnyConnect Secure Mobility Client for Windows with Network Access Manager Module Privilege Escalation Vulnerability.
The severity rating of this vulnerability is medium.
The Cisco AnyConnect Secure Mobility Client for Windows version earlier than 4.10.03104 is affected by this vulnerability.
An authenticated, local attacker can exploit this vulnerability by escalating privileges on an affected device.