TROYANOSYVIRUS
Retour aux CVEs

CVE-2020-3153

MEDIUMCISA KEV
6.5

Description

A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.

Details CVE

Score CVSS v3.16.5
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie2/19/2020
Derniere modification10/28/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurCisco
ProduitAnyConnect Secure
Nom vulnerabiliteCisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability
Date ajout KEV2022-10-24
Date limite remediation2022-11-14
Utilise dans ransomwareKnown

Produits affectes

cisco:anyconnect_secure_mobility_client

Faiblesses (CWE)

CWE-427CWE-427

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.