Monday, November 4, 2024
HomeCVE/vulnerabilityHackers Actively Exploiting Cisco AnyConnect Secure Flaw to Perform DLL Hijacking

Hackers Actively Exploiting Cisco AnyConnect Secure Flaw to Perform DLL Hijacking

Published on

Malware protection

Cisco issued a warning of active exploitation attempts targeting two security vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows. 

The security flaws are tracked as CVE-2020-3153 (CVSS score: 6.5) and CVE-2020-3433 (CVSS score: 7.8), which allows the attacker to copy malicious files to arbitrary locations with system-level privileges. Both the vulnerabilities are dated 2020 and are now patched.

CVE-2020-3153 – Installer Component of Cisco AnyConnect Secure Mobility Client for Windows

The vulnerability tracked as (CVE-2020-3153) resides in the installer component of the Cisco AnyConnect Secure Mobility Client for Windows. 

- Advertisement - SIEM as a Service

This allows an authenticated local attacker to copy user-supplied files to system-level directories with system-level privileges.

Cisco mentions that this security flaw occurred due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. 

This includes DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.

Vulnerable Products

Cisco says this vulnerability affected the Cisco AnyConnect Secure Mobility Client for Windows releases earlier than 4.8.02042.

Fix Available

Cisco AnyConnect Secure Mobility Client for Windows releases 4.8.02042 and later contained the fix for this vulnerability.

CVE-2020-3433 -Interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows

This vulnerability resides in the interprocess communication (IPC) channel of the Cisco AnyConnect Secure Mobility Client for Windows that allows an authenticated, local attacker to perform a DLL hijacking attack.

“To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system”, Cisco

The flaw is due to insufficient validation of resources that are loaded by the application at run time. Hence, an attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process.

Vulnerable Products

Cisco says this vulnerability affects Cisco AnyConnect Secure Mobility Client for Windows releases earlier than Release 4.9.00086.

This vulnerability does not affect the following Cisco products:

  • AnyConnect Secure Mobility Client for MacOS
  • AnyConnect Secure Mobility Client for Linux
  • AnyConnect Secure Mobility Client for mobile device operating systems such as iOS, Android, and Universal Windows Platform

Fix Available

Cisco addressed this vulnerability in Cisco AnyConnect Secure Mobility Client for Windows releases 4.9.00086 and later.

“In October 2022, the Cisco PSIRT became aware of additionally attempted exploitation of this vulnerability in the wild,” Cisco warned.

“Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability.”

The alert follows the decision of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add the two CISCO flaws to its Known Exploited Vulnerabilities catalog.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

“These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose a significant risk to the federal enterprise”, Cisco

Reports say federal agencies were given three weeks, until November 11th, to address both CISCO vulnerabilities.

Managed DDoS Attack Protection for Applications – Download Free Guide

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

A Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber Attack

The "You Dun" hacking group exploited vulnerable Zhiyuan OA software using SQL injection, leveraging...

Okta Verify Agent for Windows Flaw Let Attackers Steal User Passwords

A newly discovered vulnerability in Okta's Device Access features for Windows could allow attackers...

MediaTek High Severity Vulnerabilities Let Attackers Escalate Privileges

In its recent MediaTek Product Security Bulletin, the chipmaker disclosed two high-severity security vulnerabilities...