Lucene search

K
ciscoCiscoCISCO-SA-20171004-ANAM
HistoryOct 04, 2017 - 4:00 p.m.

Cisco AnyConnect Network Access Manager Dual-Homed Interface Vulnerability

2017-10-0416:00:00
tools.cisco.com
49

EPSS

0

Percentile

5.1%

A vulnerability in the Network Access Manager (NAM) of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker to enable multiple network adapters.

The vulnerability is due to insufficient NAM policy enforcement. An attacker could exploit this vulnerability by manipulating network interfaces of the device to allow multiple active network interfaces. A successful exploit could allow the attacker to send traffic over a non-authorized network interface.

Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-anam [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-anam”]

Affected configurations

Vulners
Node
ciscoanyconnect_secure_mobility_clientMatchany
OR
ciscoanyconnect_secure_mobility_clientMatchany
VendorProductVersionCPE
ciscoanyconnect_secure_mobility_clientanycpe:2.3:a:cisco:anyconnect_secure_mobility_client:any:*:*:*:*:*:*:*

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20171004-ANAM