CVE-2024-20337

CWE-934 documents4 sources
Severity
8.2HIGH
EPSS
3.8%
top 11.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 6

Description

A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or a

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:NExploitability: 2.8 | Impact: 4.7

Affected Packages2 packages

NVDcisco/secure_client4.10.040654.10.08025+1
CVEListV5cisco/cisco_secure_client34 versions+33

🔴Vulnerability Details

2
GHSA
GHSA-j296-jhq5-3x6c: A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return2024-03-06
CVEList
CVE-2024-20337: A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return2024-03-06

📋Vendor Advisories

1
Cisco
Cisco Secure Client Carriage Return Line Feed Injection Vulnerability2024-03-06