SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   Cisco VPN Client Vendors:   Cisco
Cisco VPN Client Weak 'vpnclient.ini' File Permissions Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1033750
SecurityTracker URL:  http://securitytracker.com/id/1033750
CVE Reference:   CVE-2015-7600   (Links to External Site)
Date:  Oct 7 2015
Impact:   Execution of arbitrary code via local system, Root access via local system, User access via local system

Version(s): 5.0.07.0440; possibly earlier versions
Description:   A vulnerability was reported in Cisco VPN Client. A local user can obtain elevated privileges on the target system.

The application installs the 'vpnclient.ini' file with weak access control list permissions. A local user can modify the file to include an arbitrary program name in the ApplicationLauncher section 'Command' field to cause arbitrary code to be executed on the target system with the privileges of the target user.

The original advisory is available at:

https://www.nettitude.co.uk/vulnerability-discovered-in-unsupported-cisco-systems-vpn-client/

Kyriakos Economou of Nettitude reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   No solution was available at the time of this entry.

[Editor's note: The product is no longer supported by the vendor.]

Vendor URL:  www.cisco.com/ (Links to External Site)
Cause:   Access control error, Configuration error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC