Mac OS X : Cisco AnyConnect Secure Mobility Client 3.1 < 3.1(495) MiTM

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote host has software installed that is vulnerable to
man-in-the-middle attacks.

Description :

The remote host has a version of Cisco AnyConnect 3.1 prior to
3.1(495). As such, it prompts the user to decide whether or not to
proceed when an untrusted certificate is seen. Accepting an untrusted
certificate could result in a man-in-the-middle attack.

See also :

http://www.nessus.org/u?b24acefb

Solution :

Upgrade to Cisco AnyConnect Secure Mobility Client 3.1(495) or later.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 3.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 61519 ()

Bugtraq ID: 54847

CVE ID: CVE-2012-2498

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial