TROYANOSYVIRUS
Back to CVEs

CVE-2020-3153

MEDIUMCISA KEV
6.5

Description

A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.

CVE Details

CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/19/2020
Last Modified10/28/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorCisco
ProductAnyConnect Secure
Vulnerability NameCisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability
KEV Date Added2022-10-24
Remediation Due Date2022-11-14
Ransomware UseKnown

Affected Products

cisco:anyconnect_secure_mobility_client

Weaknesses (CWE)

CWE-427CWE-427

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.