Cisco AnyConnect Secure Mobility Client 3.0 < 3.0 MR8 Multiple Vulnerabilities

Medium Nessus Plugin ID 59821


The remote host has software installed that is affected by multiple vulnerabilities.


The remote host has a version of Cisco AnyConnect < 3.0 MR8.
Such versions are affected by the following vulnerabilities :

- The HostScan VPN downloader implementation does not compare timestamps of offered software to install with currently installed software, which may allow remote attackers to downgrade the software via ActiveX or Java components. (CVE-2012-2495)

- Man-in-the-middle attacks are possible even when the ASA is configured with a legitimate certificate.

- No certificate name checking is performed when using IPsec as the tunnel protocol, which could result in man-in-the-middle attacks. (CVE-2012-2499)

- Certificate names are not verified during WebLaunch of IPsec, which could result in man-in-the-middle attacks. (CVE-2012-2500)


Upgrade to Cisco AnyConnect Secure Mobility Client 3.0 MR8 or greater.

See Also

Plugin Details

Severity: Medium

ID: 59821

File Name: cisco_anyconnect_vpn_hostscan_downgrade.nasl

Version: $Revision: 1.11 $

Type: local

Agent: windows

Family: Windows

Published: 2012/07/02

Modified: 2016/09/06

Dependencies: 54953

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:anyconnect_secure_mobility_client

Required KB Items: SMB/cisco_anyconnect/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/06/20

Vulnerability Publication Date: 2012/06/20

Reference Information

CVE: CVE-2012-2495, CVE-2012-2498, CVE-2012-2499, CVE-2012-2500

BID: 54108, 54826, 54847

OSVDB: 83159, 84469, 84470, 84472

CISCO-BUG-ID: CSCtx74235, CSCtz26985, CSCtz29197, CSCtz29470

CISCO-SA: cisco-sa-20120620-ac