Cisco AnyConnect Secure Mobility Client 2.x < 3.1.13015.0 / 4.x < 4.2.1035.0 Arbitrary File Manipulation

medium Nessus Plugin ID 87894

Synopsis

The remote host is affected by an arbitrary file manipulation vulnerability.

Description

The Cisco AnyConnect Secure Mobility Client installed on the remote host is version 2.x or 3.x prior to 3.1.13015.0 or 4.x prior to 4.2.1035.0. It is, therefore, affected by an arbitrary file manipulation vulnerability due to missing source path validation in interprocess communication (IPC) commands. A local attacker can exploit this, via crafted IPC messages, to move arbitrary files with elevated privileges, resulting in a loss of integrity and a denial of service condition.

Solution

Upgrade to Cisco AnyConnect Secure Mobility Client version 3.1.13015.0 / 4.2.1035.0 or later.

See Also

http://www.nessus.org/u?2c5b4b2e

https://tools.cisco.com/bugsearch/bug/CSCuv48563

Plugin Details

Severity: Medium

ID: 87894

File Name: cisco_anyconnect_4_2_1025.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 1/13/2016

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 6.6

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:C

Vulnerability Information

CPE: cpe:/a:cisco:anyconnect_secure_mobility_client

Required KB Items: SMB/Registry/Enumerated, installed_sw/Cisco AnyConnect Secure Mobility Client

Exploit Ease: No known exploits are available

Patch Publication Date: 12/23/2015

Vulnerability Publication Date: 10/8/2015

Reference Information

CVE: CVE-2015-6322

BID: 77055

CISCO-SA: cisco-sa-20151008-asmc

CISCO-BUG-ID: CSCuv48563