Security

Patches

Cisco AnyConnect Windows client under active attack

Make sure you're patched – and update VMware Cloud Foundation, too, by the way


Cisco says miscreants are exploiting two vulnerabilities in its AnyConnect Secure Mobility Client for Windows, which is supposed to ensure safe VPN access for remote workers.

One of the pair of flaws, tracked as CVE-2020-3433, is a privilege-escalation issue: an authenticated, local user can exploit AnyConnect to execute code with SYSTEM-level privileges. A rogue insider or malware on a PC can use this to gain total control over the system. It affects Cisco AnyConnect Secure Mobility Client for Windows releases earlier than Release 4.9.00086.

The high-severity vulnerability received a 7.8 of 10 CVSS severity score, and the good news is that the networking giant released a software patch to fix the flaw a couple of years ago. Cisco first alerted customers about this bug in August 2020, and previously warned that proof-of-concept exploit code was publicly available. Now the vendor issued a fresh warning: 

"In October 2022, the Cisco Product Security Incident Response Team became aware of additional attempted exploitation of this vulnerability in the wild. Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability."

Presumably miscreants, once they've infiltrated a network, are abusing this software to gain full control over the PCs of AnyConnect users.

The second Cisco vulnerability, tracked as CVE-2020-3153, is in the installer component of the AnyConnect Secure Mobility Client for Windows, and it also requires a logged-in user or malware on a system to exploit. It's considered a medium-severity bug, with a 6.5 CVSS score, but considering both Ciso and CISA are aware of in-the-wild exploits, we'd suggest giving it high-priority patching.

This one is due to the incorrect handling of directory paths, and an authenticated user could exploit the bug to have their own code copied to a system directory and run with high privileges, allowing them to commandeer the PC, we're told.

Software releases 4.8.02042 and earlier are vulnerable, and all of the more recent versions of the product contained the fix.

A day before the vendor released its own security update, the US Cybersecurity and Infrastructure Agency (CISA) added both of the Cisco AnyConnect Secure Mobility Client for Windows bugs to its Known Exploited Vulnerabilities Catalog.

In total, Cisco pushed 18 security updates so far this month, with six ranked as "high" severity and the rest "medium." ®

PS: VMware Cloud Foundation contains a critical remote code execution vulnerability (CVE-2021-39144) via the XStream open source library it imports. Updates are said to be available to close this hole.

Send us news
7 Comments

Cisco intros AI to find firewall flaws, warns this sort of thing can't be free

Predicts cyber crims will find binary brainboxes harder to battle

Cisco's cloud network push will tie licensing change to generational product refreshes

Bundled support has already come to Catalyst – but don't bother asking how it works

A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list

Apparently no one thought to check if this D-Link router 'issue' was actually exploitable

Microsoft's bug bounty turns 10. Are these kinds of rewards making code more secure?

Katie Moussouris, who pioneered Redmond's program, says folks are focusing on the wrong thing

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

Cisco delivers a powerup to its switches for small and medium biz

Catalyst 1200 and 1300 keep perpetual licenses, PoE and stackability

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

Weak session keys let snoops take a byte out of your Bluetooth traffic

BLUFFS spying flaw present in iPhones, ThinkPad, plenty of chipsets

Uncle Sam probes cyberattack on Pennsylvania water system by suspected Iranian crew

CISA calls for stronger IT defenses as Texas district also hit by ransomware crew

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets

Akamai says it reported the flaws to Microsoft. Redmond shrugged

Apple and some Linux distros are open to Bluetooth attack

Issue has been around since at least 2012