Cisco Secure Client Software DoS (cisco-sa-accsc-dos-9SLzkZ8) (CVE-2023-20240)

medium Nessus Plugin ID 186474

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client is affected by multiple denial of service (DoS) vulnerabilities. These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the authenticated attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwf21381

See Also

http://www.nessus.org/u?85bba4d3

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf21381

Plugin Details

Severity: Medium

ID: 186474

File Name: cisco-sa-accsc-dos-9SLzkZ8_cve-2023-20240.nasl

Version: 1.4

Type: local

Agent: windows, macosx, unix

Family: CISCO

Published: 11/30/2023

Updated: 1/17/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2023-20240

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:anyconnect_secure_mobility_client, cpe:/a:cisco:secure_client

Required KB Items: installed_sw/Cisco AnyConnect Secure Mobility Client

Exploit Ease: No known exploits are available

Patch Publication Date: 11/15/2023

Vulnerability Publication Date: 11/15/2023

Reference Information

CVE: CVE-2023-20240

CISCO-SA: cisco-sa-accsc-dos-9SLzkZ8

IAVA: 2023-A-0642

CISCO-BUG-ID: CSCwf21381