Lucene search

K
cve[email protected]CVE-2024-20391
HistoryMay 15, 2024 - 6:15 p.m.

CVE-2024-20391

2024-05-1518:15:10
CWE-306
web.nvd.nist.gov
37
cisco secure client
vulnerability
unauthenticated attacker
elevate privileges
nam module
physical access
arbitrary code
system privileges
exploit

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in the Network Access Manager (NAM) module of Cisco Secure Client could allow an unauthenticated attacker with physical access to an affected device to elevate privileges to SYSTEM.

This vulnerability is due to a lack of authentication on a specific function. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges on an affected device.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Secure Client",
    "versions": [
      {
        "version": "4.9.00086",
        "status": "affected"
      },
      {
        "version": "4.9.01095",
        "status": "affected"
      },
      {
        "version": "4.9.02028",
        "status": "affected"
      },
      {
        "version": "4.9.03047",
        "status": "affected"
      },
      {
        "version": "4.9.03049",
        "status": "affected"
      },
      {
        "version": "4.9.04043",
        "status": "affected"
      },
      {
        "version": "4.9.04053",
        "status": "affected"
      },
      {
        "version": "4.9.05042",
        "status": "affected"
      },
      {
        "version": "4.9.06037",
        "status": "affected"
      },
      {
        "version": "4.10.00093",
        "status": "affected"
      },
      {
        "version": "4.10.01075",
        "status": "affected"
      },
      {
        "version": "4.10.02086",
        "status": "affected"
      },
      {
        "version": "4.10.03104",
        "status": "affected"
      },
      {
        "version": "4.10.04065",
        "status": "affected"
      },
      {
        "version": "4.10.04071",
        "status": "affected"
      },
      {
        "version": "4.10.05085",
        "status": "affected"
      },
      {
        "version": "4.10.05095",
        "status": "affected"
      },
      {
        "version": "4.10.05111",
        "status": "affected"
      },
      {
        "version": "4.10.06079",
        "status": "affected"
      },
      {
        "version": "4.10.06090",
        "status": "affected"
      },
      {
        "version": "4.10.07061",
        "status": "affected"
      },
      {
        "version": "4.10.07062",
        "status": "affected"
      },
      {
        "version": "4.10.07073",
        "status": "affected"
      },
      {
        "version": "4.10.08025",
        "status": "affected"
      },
      {
        "version": "4.10.08029",
        "status": "affected"
      },
      {
        "version": "5.0.00238",
        "status": "affected"
      },
      {
        "version": "5.0.00529",
        "status": "affected"
      },
      {
        "version": "5.0.00556",
        "status": "affected"
      },
      {
        "version": "5.0.01242",
        "status": "affected"
      },
      {
        "version": "5.0.02075",
        "status": "affected"
      },
      {
        "version": "5.0.03072",
        "status": "affected"
      },
      {
        "version": "5.0.03076",
        "status": "affected"
      },
      {
        "version": "5.0.04032",
        "status": "affected"
      },
      {
        "version": "5.0.05040",
        "status": "affected"
      },
      {
        "version": "5.1.0.136",
        "status": "affected"
      },
      {
        "version": "5.1.1.42",
        "status": "affected"
      },
      {
        "version": "5.1.2.42",
        "status": "affected"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2024-20391