TROYANOSYVIRUS
Volver a CVEs

CVE-2020-3153

MEDIUMCISA KEV
6.5

Descripcion

A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.

Detalles CVE

Puntuacion CVSS v3.16.5
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado2/19/2020
Ultima modificacion10/28/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorCisco
ProductoAnyConnect Secure
Nombre vulnerabilidadCisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability
Fecha inclusion KEV2022-10-24
Fecha limite remediacion2022-11-14
Uso en ransomwareKnown

Productos afectados

cisco:anyconnect_secure_mobility_client

Debilidades (CWE)

CWE-427CWE-427

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.