Mac OS X : Cisco AnyConnect Secure Mobility Client 3.1 < 3.1(495) MiTM

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote host has software installed that is vulnerable to
man-in-the-middle attacks.

Description :

The remote host has a version of Cisco AnyConnect 3.1 prior to
3.1(495). As such, it prompts the user to decide whether or not to
proceed when an untrusted certificate is seen. Accepting an untrusted
certificate could result in a man-in-the-middle attack.

See also :

http://www.nessus.org/u?b24acefb

Solution :

Upgrade to Cisco AnyConnect Secure Mobility Client 3.1(495) or later.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 3.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 61519 ()

Bugtraq ID: 54847

CVE ID: CVE-2012-2498