TROYANOSYVIRUS
Voltar para CVEs

CVE-2020-3153

MEDIUMCISA KEV
6.5

Descricao

A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.

Detalhes CVE

Pontuacao CVSS v3.16.5
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado2/19/2020
Ultima modificacao10/28/2025
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorCisco
ProdutoAnyConnect Secure
Nome da vulnerabilidadeCisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability
Data inclusao KEV2022-10-24
Prazo de remediacao2022-11-14
Uso em ransomwareKnown

Produtos afetados

cisco:anyconnect_secure_mobility_client

Fraquezas (CWE)

CWE-427CWE-427

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.