Cisco AnyConnect Secure Mobility Client 2.x / 3.x < 3.1(3103) Host Scan Multiple Vulnerabilities

Medium Nessus Plugin ID 66023


The remote host has software installed that is potentially affected by multiple vulnerabilities.


The remote host has a version of Cisco AnyConnect 2.x or 3.x prior to 3.1(3103). It is, therefore, potentially affected by the following vulnerabilities :

- A heap-based buffer overflow error exists in the file 'ciscod.exe'. (CVE-2013-1173 / CSCud14143)

- An unspecified error exists that could allow local privilege escalation attacks.
(CVE-2013-1172 / CSCud14153)

Note that these issues affect only hosts with the 'Host Scan' component deployed.


Upgrade to Cisco AnyConnect Secure Mobility Client 3.1(3103) or later.

See Also

Plugin Details

Severity: Medium

ID: 66023

File Name: cisco_anyconnect_3_1_3103.nasl

Version: $Revision: 1.1 $

Type: local

Agent: windows

Family: Windows

Published: 2013/04/18

Modified: 2013/04/18

Dependencies: 54953

Risk Information

Risk Factor: Medium


Base Score: 6.6

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:anyconnect_secure_mobility_client

Required KB Items: SMB/cisco_anyconnect/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/04/10

Vulnerability Publication Date: 2013/04/10

Reference Information

CVE: CVE-2013-1172, CVE-2013-1173

BID: 59034, 59036

OSVDB: 92218, 92219

CISCO-BUG-ID: CSCud14143, CSCud14153