Mac OS X : Cisco AnyConnect Secure Mobility Client 3.0.x / 3.1.x Local Privilege Escalation

medium Nessus Plugin ID 70259

Synopsis

The remote host has software installed that is vulnerable to privilege escalation attacks.

Description

The remote host has a version of Cisco AnyConnect 3.0.x or 3.1.x. As such, it is vulnerable to a local privilege escalation attack caused by improper permissions on a library directory. This issue could allow a local attacker to execute arbitrary programs with elevated privileges.

Solution

The vendor has not released a patch. Consult the workaround provided by the vendor.

See Also

https://tools.cisco.com/security/center/viewAlert.x?alertId=30916

http://www.nessus.org/u?34812377

Plugin Details

Severity: Medium

ID: 70259

File Name: macosx_cisco_anyconnect_priv_esc.nasl

Version: 1.4

Type: local

Agent: macosx

Published: 10/1/2013

Updated: 11/27/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2013-1130

Vulnerability Information

CPE: cpe:/a:cisco:anyconnect_secure_mobility_client

Required KB Items: MacOSX/Cisco_AnyConnect/Installed

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 9/19/2013

Reference Information

CVE: CVE-2013-1130

BID: 62519

CISCO-BUG-ID: CSCue33619