CVE-2020-27123Exposed Dangerous Method or Function in Cisco Anyconnect Secure Mobility Client

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 81.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 6
Latest updateMay 24

Description

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on t

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-w2f2-q5rv-4h3g: A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, l2022-05-24
CVEList
Cisco AnyConnect Secure Mobility Client for Windows Arbitrary File Read Vulnerability2020-11-06

📋Vendor Advisories

1
Cisco
Cisco AnyConnect Secure Mobility Client for Windows Arbitrary File Read Vulnerability2020-11-04
CVE-2020-27123 — Exposed Dangerous Method or Function | cvebase