Cisco AnyConnect VPN Client Two Vulnerabilities
RISK: High Risk
TYPE: Security software and application - Security Software & Appliance
Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to compromise a user's system.
An error in the graphical user interface when displayed on the Windows logon screen can be exploited to perform certain actions with the privileges of the LocalSystem account.
Successful exploitation of this vulnerability requires the Start Before Logon (SBL) feature to be enabled.
An error in the helper application used for remote deployment of the client (e.g. "Cisco.AnyConnect.VPNWeb.1" ActiveX control) due to insufficient authenticity validation of downloaded executables can be exploited to download and execute an arbitrary program.
Impact
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Cisco AnyConnect VPN Client 2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Update to a fixed version (please see the vendor's advisory for details).
http://www.cisco.com/warp/public/707/cisco-sa-2011
Vulnerability Identifier
Source
Related Link
Share with