Cisco AnyConnect Secure Mobility Client Lets Remote Users Bypass Security Restrictions on the Target System
|
SecurityTracker Alert ID: 1041075 |
SecurityTracker URL: http://securitytracker.com/id/1041075
|
CVE Reference:
CVE-2018-0334
(Links to External Site)
|
Date: Jun 12 2018
|
Impact:
Modification of system information, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Cisco AnyConnect Secure Mobility Client. A remote user can bypass security controls on the target system.
The system does not properly use the Simple Certificate Enrollment Protocol and does not properly validate certificates. A remote user can bypass the TLS certificate check when downloading certain configuration files to cause the system to load specially crafted profile and localization files. This can be exploited to change the configuration profile, a certificate, or localization data on the target system.
The vendor has assigned bug ID CSCvh23141 to this vulnerability.
|
Impact:
A remote user can change the configuration profile, a certificate, or localization data on the target system.
|
Solution:
The vendor has issued a fix.
The vendor advisory is available at:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-AnyConnect-cert-bypass
|
Vendor URL: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-AnyConnect-cert-bypass (Links to External Site)
|
Cause:
Authentication error
|
Underlying OS: Android, Apple (iOS), Linux (Any), UNIX (macOS/OS X), Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
Subject: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-AnyConnect-cert-bypass
|
|
|