This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote host has software installed that is vulnerable to
The remote host has a version of Cisco AnyConnect 3.1 prior to
3.1(495). As such, it prompts the user to decide whether or not to
proceed when an untrusted certificate is seen. Accepting an untrusted
certificate could result in a man-in-the-middle attack.
See also :
Upgrade to Cisco AnyConnect Secure Mobility Client 3.1(495) or later.
Risk factor :
Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.0
Public Exploit Available : false
Family: MacOS X Local Security Checks
Nessus Plugin ID: 61519 ()
Bugtraq ID: 54847
CVE ID: CVE-2012-2498
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.