Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-34788

Опубликовано: 06 окт. 2021
Источник: nvd
CVSS3: 7
CVSS2: 6.9
EPSS Низкий

Описание

A vulnerability in the shared library loading mechanism of Cisco AnyConnect Secure Mobility Client for Linux and Mac OS could allow an authenticated, local attacker to perform a shared library hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to a race condition in the signature verification process for shared library files that are loaded on an affected device. An attacker could exploit this vulnerability by sending a series of crafted interprocess communication (IPC) messages to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected device with root privileges. To exploit this vulnerability, the attacker must have a valid account on the system.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*
Версия до 4.10.03104 (исключая)

Одно из

cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

EPSS

Процентиль: 12%
0.00039
Низкий

7 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-367
CWE-367

Связанные уязвимости

github
больше 3 лет назад

A vulnerability in the shared library loading mechanism of Cisco AnyConnect Secure Mobility Client for Linux and Mac OS could allow an authenticated, local attacker to perform a shared library hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to a race condition in the signature verification process for shared library files that are loaded on an affected device. An attacker could exploit this vulnerability by sending a series of crafted interprocess communication (IPC) messages to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected device with root privileges. To exploit this vulnerability, the attacker must have a valid account on the system.

CVSS3: 7
fstec
больше 4 лет назад

Уязвимость механизма загрузки общей библиотеки средства криптографической защиты Cisco AnyConnect Secure Mobility Client, вызванная «ситуацией гонки», позволяющая нарушителю выполнить произвольный код с привилегиями root

EPSS

Процентиль: 12%
0.00039
Низкий

7 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-367
CWE-367