Lucene search

K
ciscoCiscoCISCO-SA-20150923-CVE-2015-6306
HistorySep 23, 2015 - 4:03 p.m.

Cisco AnyConnect Secure Mobility Client for Linux and Mac OS X Privilege Escalation Vulnerability

2015-09-2316:03:03
tools.cisco.com
18

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

27.4%

A vulnerability in the code responsible for the self-updating feature of Cisco AnyConnect Secure Mobility Client for Linux and the Cisco AnyConnect Secure Mobility Client for Mac OS X could allow an authenticated, local attacker to execute an arbitrary executable file of its choosing with privileges equivalent to the Linux or Mac OS X root account.

The vulnerability is due to lack of checks in the code for the path and filename of the file being installed. An attacker could exploit this vulnerability by invoking this functionality with a crafted installation file. A successful exploit could allow the attacker to execute commands on the underlying Linux or Mac OS X host with privileges equivalent to the root account.

Cisco has confirmed the vulnerability and software updates are available.

To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These access requirements decrease the likelihood of a successful exploit.

This vulnerability can be exploited only on systems running on Linux and Mac OS platforms. Systems on Microsoft Windows platforms are not affected by this vulnerability.

Cisco indicates through the CVSS score that functional code exists; however, the code is not known to be
publicly available.

This issue was reported to the Cisco PSIRT by Mr. Yorick Koster of Securify B.V. We would like to thank Mr. Koster and Securify B.V. for reporting this vulnerability to Cisco and working with us towards a coordinated disclosure.

Affected configurations

Vulners
Node
ciscoanyconnect_secure_mobility_clientMatchany
OR
ciscoanyconnect_secure_mobility_clientMatchany
VendorProductVersionCPE
ciscoanyconnect_secure_mobility_clientanycpe:2.3:a:cisco:anyconnect_secure_mobility_client:any:*:*:*:*:*:*:*

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

27.4%

Related for CISCO-SA-20150923-CVE-2015-6306