Логотип exploitDog
bind:CVE-2020-3435
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3435

Количество 3

Количество 3

nvd логотип

CVE-2020-3435

больше 5 лет назад

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to modify VPN profile files. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-f4qg-m5r8-999r

больше 3 лет назад

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to modify VPN profile files. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system.

EPSS: Низкий
fstec логотип

BDU:2020-04672

больше 5 лет назад

Уязвимость канала межпроцессного взаимодействия (IPC) средства криптографической защиты Cisco AnyConnect Secure Mobility Client, позволяющая нарушителю перезаписать профили VPN

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3435

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to modify VPN profile files. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system.

CVSS3: 5.5
0%
Низкий
больше 5 лет назад
github логотип
GHSA-f4qg-m5r8-999r

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to modify VPN profile files. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-04672

Уязвимость канала межпроцессного взаимодействия (IPC) средства криптографической защиты Cisco AnyConnect Secure Mobility Client, позволяющая нарушителю перезаписать профили VPN

CVSS3: 5.5
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу