Cisco AnyConnect Secure Mobility Client < 4.4.02034 Local Privilege Escalation

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

A VPN application installed on the remote host is affected by a
privilege escalation vulnerability.

Description :

The version of Cisco AnyConnect Secure Mobility Client installed on
the remote Windows host is prior to 4.4.02034. It is, therefore,
affected by a local privilege escalation vulnerability due to improper
validation of paths and filenames of dynamic-link library (DLL) files
before they are loaded. A local attacker can exploit this, via a
specially crafted DLL file, to escalate privileges and execute
commands with SYSTEM level privileges.

See also :

http://www.nessus.org/u?b76d8a8e
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc97928

Solution :

Upgrade to Cisco AnyConnect Secure Mobility Client version 4.4.02034
or later.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 100790 ()

Bugtraq ID: 98938

CVE ID: CVE-2017-6638

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now