CERT-In Vulnerability Note
CIVN-2020-0315
DLL Hijacking Vulnerability in Cisco
Original Issue Date:August 11, 2020
Severity Rating: HIGH
Component Affected
- Cisco AnyConnect Secure Mobility Client for Windows releases prior to 4.9.00086
Overview
A vulnerability have been reported in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows which could allow an authenticated, local attacker to perform a DLL hijacking attack.
Description
A Vulnerability exists in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows due to insufficient validation of resources that are loaded by the application at run time that could allow the attacker to perform a DLL(dynamic-linked libraries)hijacking attack. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges.
Solution
Apply appropriate updates as mentioned in:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW
Vendor Information
CISCO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW
References
CISCO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW
CVE Name
CVE-2020-3433
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|