Cisco warns customers to patch AnyConnect flaws

Share post:

Cisco has warned of two vulnerabilities, identified as CVE-2020-3433 and CVE-2020-3153, that could allow local attackers to conduct DLL hijacking attacks and copy files to system directories with system-level privileges.

Cisco’s most recent warning came two years after the vulnerabilities were fixed in 2020, so Cisco is urging administrators to update the vulnerable software and block ongoing attacks.

“In October 2022, the CISCO PSIRT became aware of additional attempted exploitation of this vulnerability in the world. Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability,” the company warned.

Vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows are limited in scope although they are being exploited in the wild.

The AnyConnect Secure Mobility Client simplifies secure enterprise endpoint access enables employees to work from anywhere while connected to a secure VPN via Secure Sockets Layer (SSE) and IPsec 1KEv2.

They are limited in scope, as both vulnerabilities require authentication that allows attackers to have valid login credentials on the system. However, the vulnerabilities can be chained with Windows privilege escalation bugs thanks to the public availability of PoC exploits.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways