Cisco AnyConnect Secure Mobility Client VPN Downloader RCE (cisco-sa-20120620-ac)

High Nessus Plugin ID 59820


The remote host has software installed that is affected by an arbitrary code execution vulnerability.


The remote host has a version of Cisco AnyConnect < 2.5 MR6.
Such versions are potentially affected by an arbitrary code execution vulnerability. The WebLaunch VPN downloader implementation does not properly validate binaries that are received, which can allow remote attackers to execute arbitrary code via ActiveX or Java components.


Upgrade to Cisco AnyConnect Secure Mobility Client 2.5 MR6 or greater.

See Also

Plugin Details

Severity: High

ID: 59820

File Name: cisco_anyconnect_vpn_downloader_code_execution.nasl

Version: $Revision: 1.10 $

Type: local

Agent: windows

Family: Windows

Published: 2012/07/02

Modified: 2016/10/05

Dependencies: 54953

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:anyconnect_secure_mobility_client

Required KB Items: SMB/cisco_anyconnect/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/06/20

Vulnerability Publication Date: 2012/06/20

Reference Information

CVE: CVE-2012-2493

BID: 54107

OSVDB: 83096


CISCO-SA: cisco-sa-20120620-ac

ZDI: ZDI-12-156