⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-11-14.

CVE-2020-3433

CWE-4277 documents7 sources
Severity
7.8HIGH
EPSS
4.5%
top 10.91%
CISA KEV
KEVRansomware
Added 2022-10-24
Due 2022-11-14
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedAug 17
KEV addedOct 24
KEV dueNov 14
CISA Required Action: Apply updates per vendor instructions.

Description

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
GHSA-v63m-wv25-vhmp: A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, l2022-05-24
CVEList
Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability2020-08-17
VulnCheck
Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability2020

💥Exploits & PoCs

1
Metasploit
Cisco AnyConnect Privilege Escalations (CVE-2020-3153 and CVE-2020-3433)

📋Vendor Advisories

2
CISA
Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability2022-10-24
Cisco
Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability2020-08-05
CVE-2020-3433 (HIGH CVSS 7.8) | A vulnerability in the interprocess | cvebase.io