SB2021061623 - Privilege escalation in Cisco AnyConnect Secure Mobility Client for Windows



SB2021061623 - Privilege escalation in Cisco AnyConnect Secure Mobility Client for Windows

Published: June 16, 2021

Security Bulletin ID SB2021061623
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Insecure DLL loading (CVE-ID: CVE-2021-1567)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the application loads DLL libraries in an insecure manner. A local user can place a specially crafted .dll file on system, if the VPN Posture (HostScan) Module is installed on the AnyConnect client, and execute arbitrary code with SYSTEM privileges.

The vulnerability affects Cisco AnyConnect Secure Mobility Client for Windows.


2) Uncontrolled Memory Allocation (CVE-ID: CVE-2021-1568)

The vulnerability allows a local user to perform denial of service (DoS) attack.

The vulnerability exists due to uncontrolled memory allocation. A local user can crash the VPN Agent service when the affected application is launched.


Remediation

Install update from vendor's website.