Vulnslist

find the latest Cisco vulnerabilities

Cisco AnyConnect Secure Mobility Client Privilege Escalation Vulnerability

Cisco-SA-20150602-CVE-2015-0761 · Medium · Published · Updated

A vulnerability in the code of Cisco AnyConnect Secure Mobility Client for Linux could allow an authenticated, local attacker to elevate privileges to those of the root user. The vulnerability is due to improper implementation of some internal functions. An attacker could exploit this vulnerability by accessing the system and calling the vpnagent with some options. An exploit could allow the attacker to obtain privileged access to the system. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These access requirements decrease the likelihood of a successful exploit. This vulnerability can be exploited only on systems running on Linux platforms. Systems on Mac OS and Microsoft Windows platforms are not affected by this vulnerability. Cisco would like to thank Graham Markall for reporting this vulnerability.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to access local systems.

Administrators are advised to allow only privileged users to access administration or management systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0761
Cisco Bug IDsCSCus86790
CVSS ScoreBase 6.8
Base 6.8 AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
Product Names From Source
Cisco AnyConnect Secure Mobility Client, Cisco Secure Client

Related Products

Product CVE Evidence
Cisco Secure Client CVE-2015-0761 Cisco OpenVuln
Cisco AnyConnect Secure Mobility Client CVE-2015-0761 Cisco OpenVuln