First published: Wed Jan 13 2021(Updated: )
A vulnerability in the loading process of specific DLLs in Cisco Proximity Desktop for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-proximity-dll-UvW4VHPM
Credit: Xavier Danest Decathlon
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Proximity |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-proximity-dll-UvW4VHPM is moderate.
To fix cisco-sa-proximity-dll-UvW4VHPM, update Cisco Proximity Desktop to the latest version provided by Cisco.
Cisco Proximity Desktop users on Windows systems with local authenticated access are affected by cisco-sa-proximity-dll-UvW4VHPM.
cisco-sa-proximity-dll-UvW4VHPM allows an authenticated local attacker to load a malicious DLL.
Currently, there are no specific workarounds recommended for cisco-sa-proximity-dll-UvW4VHPM other than applying the security update.