SynopsisThe remote host is affected by multiple vulnerabilities.
DescriptionThe remote host has a version of Cisco AnyConnect prior to 3.1(5170).
It is, therefore, potentially affected by the following vulnerabilities :
- An error exists related to the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) that could allow nonce disclosure via the 'FLUSH+RELOAD' cache side-channel attack. (CVE-2014-0076)
- A buffer overflow error exists related to invalid DTLS fragment handling that could lead to execution of arbitrary code. Note this issue only affects OpenSSL when used as a DTLS client or server. (CVE-2014-0195)
- An error exists related to DTLS handshake handling that could lead to denial of service attacks. Note this issue only affects OpenSSL when used as a DTLS client.
- An unspecified error exists that could allow an attacker to cause usage of weak keying material leading to simplified man-in-the-middle attacks.
SolutionUpgrade to Cisco AnyConnect Secure Mobility Client 3.1(5170) or later.