CVE-2023-20178

Severity
7.8HIGH
EPSS
26.6%
top 3.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 28

Description

A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established. This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could ex

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDcisco/secure_client< 5.0.02075
CVEListV5cisco/cisco_secure_client24 versions+23

🔴Vulnerability Details

2
GHSA
GHSA-6rj9-hcv7-94r5: A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Wind2023-06-28
CVEList
CVE-2023-20178: A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Wind2023-06-28

📋Vendor Advisories

1
Cisco
Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows Privilege Escalation Vulnerability2023-06-07
CVE-2023-20178 (HIGH CVSS 7.8) | A vulnerability in the client updat | cvebase.io