First published: Wed May 15 2024(Updated: )
A vulnerability in the Network Access Manager (NAM) module of Cisco Secure Client could allow an unauthenticated attacker with physical access to an affected device to elevate privileges to SYSTEM.This vulnerability is due to a lack of authentication on a specific
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-secure-nam-priv-esc-szu2vYpZ is high due to its potential to allow unauthenticated privilege escalation.
To fix cisco-sa-secure-nam-priv-esc-szu2vYpZ, update to the latest version of Cisco Secure Client that addresses this vulnerability.
Users of Cisco Secure Client could be affected by cisco-sa-secure-nam-priv-esc-szu2vYpZ if they have physical access to the device.
cisco-sa-secure-nam-priv-esc-szu2vYpZ is caused by a lack of authentication on a specific functionality within the Network Access Manager module.
No, cisco-sa-secure-nam-priv-esc-szu2vYpZ requires physical access to the affected device for exploitation.