Логотип exploitDog
bind:CVE-2020-27123
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-27123

Количество 3

Количество 3

nvd логотип

CVE-2020-27123

больше 5 лет назад

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-w2f2-q5rv-4h3g

больше 3 лет назад

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device.

EPSS: Низкий
fstec логотип

BDU:2020-05219

больше 5 лет назад

Уязвимость канала межпроцессного взаимодействия (IPC) средства криптографической защиты Cisco AnyConnect Secure Mobility Client, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-27123

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device.

CVSS3: 5.5
0%
Низкий
больше 5 лет назад
github логотип
GHSA-w2f2-q5rv-4h3g

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-05219

Уязвимость канала межпроцессного взаимодействия (IPC) средства криптографической защиты Cisco AnyConnect Secure Mobility Client, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.5
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу