Cisco AnyConnect Secure Mobility Client 3.1 < 3.1(495) MiTM

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote host has software installed that is vulnerable to
man-in-the-middle attacks.

Description :

The remote host has a version of Cisco AnyConnect 3.1 prior to
3.1(495). As such, it prompts the user to decide whether or not to
proceed when an untrusted certificate is seen. Accepting an untrusted
certificate could result in a man-in-the-middle attack.

See also :

http://www.nessus.org/u?b24acefb

Solution :

Upgrade to Cisco AnyConnect Secure Mobility Client 3.1(495) or later.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 3.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 61518 ()

Bugtraq ID: 54847

CVE ID: CVE-2012-2498

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now