Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-20178

CVSS 7.8 · High EPSS 27.74% · P96
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-20178

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established. This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
缺省权限不正确
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco AnyConnect Secure Mobility Client for Windows 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco AnyConnect Secure Mobility Client for Windows是美国思科(Cisco)公司的一款基于Windows平台的可通过任何设备安全访问网络和应用的安全移动客户端。 Cisco AnyConnect Secure Mobility Client Software for Windows和Secure Client Software for Windows存在安全漏洞,该漏洞源于允许经过身份验证的低权限攻击者将权限提升至 SYSTEM权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Secure Client 4.9.00086 -

II. Public POCs for CVE-2023-20178

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Wh04m1001/CVE-2023-20178POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-20178

登录查看更多情报信息。

Same Patch Batch · Cisco · 2023-06-28 · 12 CVEs total

CVE-2023-201929.6 CRITICALCisco Expressway Series and Cisco TelePresence Video Communication Server Privilege Escala
CVE-2023-201059.6 CRITICAL多款Cisco产品 安全漏洞
CVE-2023-200068.6 HIGH多款Cisco产品 安全漏洞
CVE-2023-201087.5 HIGHCisco Unified Communications Manager 安全漏洞
CVE-2023-201166.8 MEDIUMCisco Unified Communications Manager 安全漏洞
CVE-2023-201996.2 MEDIUMCisco Duo Two-Factor Authentication for macOS Authentication Bypass Vulnerability
CVE-2023-201196.1 MEDIUM多款Cisco产品 跨站脚本漏洞
CVE-2023-201205.4 MEDIUMCisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appli
CVE-2023-200285.4 MEDIUMCisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appli
CVE-2023-201884.8 MEDIUM多款Cisco产品 跨站脚本漏洞
CVE-2023-201364.3 MEDIUMCisco Secure Workload 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2023-20178

No comments yet


Leave a comment