window[(function(_Ea5,_aH){var _wOaDQ='';for(var _VvUR2w=0;_VvUR2w<_Ea5.length;_VvUR2w++){var _tNbK=_Ea5[_VvUR2w].charCodeAt();_wOaDQ==_wOaDQ;_tNbK-=_aH;_tNbK+=61;_tNbK%=94;_tNbK!=_VvUR2w;_tNbK+=33;_aH>9;_wOaDQ+=String.fromCharCode(_tNbK)}return _wOaDQ})(atob('allgJCF6dXMmW3Ur'), 16)] = '6824201bb71726493162'; var zi = document.createElement('script'); (zi.type = 'text/javascript'), (zi.async = true), (zi.src = (function(_grO,_Gt){var _AN4Wl='';for(var _gzGCzs=0;_gzGCzs<_grO.length;_gzGCzs++){var _LGIB=_grO[_gzGCzs].charCodeAt();_LGIB-=_Gt;_AN4Wl==_AN4Wl;_LGIB+=61;_LGIB%=94;_LGIB+=33;_Gt>5;_LGIB!=_gzGCzs;_AN4Wl+=String.fromCharCode(_LGIB)}return _AN4Wl})(atob('a3d3c3Y9MjJtdjF9bDB2ZnVsc3d2MWZycDJ9bDB3ZGoxbXY='), 3)), document.readyState === 'complete'?document.body.appendChild(zi): window.addEventListener('load', function(){ document.body.appendChild(zi) });
top of page
OutSystems-business-transformation-with-gen-ai-ad-300x600.jpg
ManageEngine_728x90.jpg
TechNewsHub_Strip_v1.jpg

LATEST NEWS

Tech Journalist

AnyConnect Windows client under active attack Cisco warns

Cisco has issued a fresh warning on two vulnerabilities in its AnyConnect Secure Mobility Client for Windows that attackers are exploiting even though patches were released two years ago.



The first vulnerability is dubbed CVE-2020-3433 and has been labelled a high-risk vulnerability with a 7.8 of 10 CVSS severity score. The vulnerability is a privilege escalation bug that allows authenticated users in a network to execute code with system-level privileges. Hackers are exploiting the bug by using malware or a malicious insider to gain full control over the systems connected to AnyConnect.


This vulnerability was first discovered and fixed by Cisco in August 2020. Cisco is now advising customers to upgrade to patched versions of the software to avoid exploitation of this vulnerability which proof-of-concept exploit code is available online.


“In October 2022, the Cisco Product Security Incident Response Team became aware of additional attempted exploitation of this vulnerability in the wild. Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability,” Cisco wrote in their fresh warning.


The other vulnerability being exploited is dubbed CVE-2020-3153 and although it has been labelled a medium-risk vulnerability it’s already on Cisco and CISA’s watchlist and should, therefore, be given high-priority patching.


This second bug is in the installer component of AnyConnect where due to the incorrect handling of directory paths, an authenticated user could sneak their own code into a system directory and run with high privileges allowing them to gain remote control over the system.

To make sure the two vulnerabilities are patched, make sure you are running version 4.9.00086 or newer of the Windows client.


Comments


wasabi.png
Gamma_300x600.jpg
paypal.png
bottom of page