CVE-2020-3435Improper Input Validation in Cisco Anyconnect Secure Mobility Client

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 76.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 17
Latest updateMay 24

Description

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-f4qg-m5r8-999r: A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, l2022-05-24
CVEList
Cisco AnyConnect Secure Mobility Client for Windows Profile Modification Vulnerability2020-08-17

📋Vendor Advisories

1
Cisco
Cisco AnyConnect Secure Mobility Client for Windows Profile Modification Vulnerability2020-08-05

💬Community

1
Bugzilla
CVE-2020-10727 broker: resetUsers operation stores password in plain text2020-04-23
CVE-2020-3435 — Improper Input Validation in Cisco | cvebase