TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2020-3153

MEDIUMCISA KEV
6.5

Beschreibung

A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.

CVE Details

CVSS v3.1 Bewertung6.5
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht2/19/2020
Zuletzt geandert10/28/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerCisco
ProduktAnyConnect Secure
SchwachstellennameCisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability
KEV Aufnahmedatum2022-10-24
Behebungsfrist2022-11-14
Ransomware-NutzungKnown

Betroffene Produkte

cisco:anyconnect_secure_mobility_client

Schwachen (CWE)

CWE-427CWE-427

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.