Friday, 11 August 2023

Cisco Security Service File Verification Bypass Could Allow Elevation of Privilege

Cisco Security Service File Verification Bypass Could Allow Elevation of Privilege

Published: June 18, 2013

Version: 1.0

Severity :High

Affected Software

·       Cisco AnyConnect VPN Client version 3.1.00495 and earlier versions

·       Cisco AnyConnect Secure Mobility Client version 3.1.00495 and earlier versions

Non-Affected Software

·       Cisco AnyConnect VPN Client version 3.1.01065

·       Cisco AnyConnect Secure Mobility Client version 3.1.01065

Overview

Executive Summary

Microsoft is providing notification of the discovery and remediation of a vulnerability in the Cisco Host Scan component of Cisco AnyConnect Secure Mobility and Cisco Secure Desktop software. The vulnerability affects the Host Scan component included in Cisco AnyConnect VPN Client and Cisco AnyConnect Secure Mobility Client software (version 3.1.00495 and earlier versions). Microsoft discovered and disclosed the vulnerability under coordinated vulnerability disclosure to the affected vendor, Cisco Systems, Inc. Cisco has remediated the vulnerability in their software.

A vulnerability exists in the way that the Cisco Security Service component (in Cisco Host Scan) handles messages for file manipulation. A user running as a standard user account who successfully exploited this vulnerability could gain elevated privileges and run arbitrary code in the security context of the system account.

Microsoft Vulnerability Research reported this issue to and coordinated with Cisco to ensure remediation of this issue. The vulnerability has been assigned the entry, CVE-2013-1172, in the Common Vulnerabilities and Exposures list. For more information, see the Cisco Security Notice: Cisco Host Scan Privilege Elevation Vulnerability.

Mitigating Factors

  • For an attack to be successful, Host Scan functionality must be enabled.
  • An attacker must have valid logon credentials and be able to log on to exploit this vulnerability.

Advisory Details

Purpose and Recommendation

To notify users of a vulnerability and its remediation.

Review the Suggested Actions section and configure as appropriate.

CVE Details:

CVE-2013-1172

Suggested Actions

Upgrade to the latest version of the affected products.

 

NOTE:The Information provided is on "as is" basis, without assurance of any kind