First published: Wed Mar 06 2024(Updated: )
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-secure-client-crlf-W43V4G7 is high due to its potential for remote exploitation.
To fix cisco-sa-secure-client-crlf-W43V4G7, ensure that you apply the latest security updates provided by Cisco for Secure Client.
Users of Cisco Secure Client who do not have the latest security updates are affected by cisco-sa-secure-client-crlf-W43V4G7.
cisco-sa-secure-client-crlf-W43V4G7 allows for a carriage return line feed (CRLF) injection attack against users.
The vulnerability cisco-sa-secure-client-crlf-W43V4G7 is caused by insufficient validation of user-supplied input in the SAML authentication process.