Wednesday, January 22, 2025
HomeCVE/vulnerabilityHackers Actively Exploiting Cisco AnyConnect Secure Flaw to Perform DLL Hijacking

Hackers Actively Exploiting Cisco AnyConnect Secure Flaw to Perform DLL Hijacking

Published on

SIEM as a Service

Follow Us on Google News

Cisco issued a warning of active exploitation attempts targeting two security vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows. 

The security flaws are tracked as CVE-2020-3153 (CVSS score: 6.5) and CVE-2020-3433 (CVSS score: 7.8), which allows the attacker to copy malicious files to arbitrary locations with system-level privileges. Both the vulnerabilities are dated 2020 and are now patched.

CVE-2020-3153 – Installer Component of Cisco AnyConnect Secure Mobility Client for Windows

The vulnerability tracked as (CVE-2020-3153) resides in the installer component of the Cisco AnyConnect Secure Mobility Client for Windows. 

This allows an authenticated local attacker to copy user-supplied files to system-level directories with system-level privileges.

Cisco mentions that this security flaw occurred due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. 

This includes DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.

Vulnerable Products

Cisco says this vulnerability affected the Cisco AnyConnect Secure Mobility Client for Windows releases earlier than 4.8.02042.

Fix Available

Cisco AnyConnect Secure Mobility Client for Windows releases 4.8.02042 and later contained the fix for this vulnerability.

CVE-2020-3433 -Interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows

This vulnerability resides in the interprocess communication (IPC) channel of the Cisco AnyConnect Secure Mobility Client for Windows that allows an authenticated, local attacker to perform a DLL hijacking attack.

“To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system”, Cisco

The flaw is due to insufficient validation of resources that are loaded by the application at run time. Hence, an attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process.

Vulnerable Products

Cisco says this vulnerability affects Cisco AnyConnect Secure Mobility Client for Windows releases earlier than Release 4.9.00086.

This vulnerability does not affect the following Cisco products:

  • AnyConnect Secure Mobility Client for MacOS
  • AnyConnect Secure Mobility Client for Linux
  • AnyConnect Secure Mobility Client for mobile device operating systems such as iOS, Android, and Universal Windows Platform

Fix Available

Cisco addressed this vulnerability in Cisco AnyConnect Secure Mobility Client for Windows releases 4.9.00086 and later.

“In October 2022, the Cisco PSIRT became aware of additionally attempted exploitation of this vulnerability in the wild,” Cisco warned.

“Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability.”

The alert follows the decision of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add the two CISCO flaws to its Known Exploited Vulnerabilities catalog.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

“These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose a significant risk to the federal enterprise”, Cisco

Reports say federal agencies were given three weeks, until November 11th, to address both CISCO vulnerabilities.

Managed DDoS Attack Protection for Applications – Download Free Guide

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

The Growing Role of AI-Powered SAST in the Developer Toolkit

In today’s app dev world, where new apps and millions of lines of code...

Ex-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

A former CIA analyst, Asif William Rahman, has pleaded guilty to charges of retaining...

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...

Criminal IP and OnTheHub Partner to Deliver Advanced Cybersecurity Solutions for Education

AI SPERA, a leading Cyber Threat Intelligence (CTI) provider, has collaborated with OnTheHub, a...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Three New ICS Advisories Released by CISA Detailing Vulnerabilities & Mitigations

The Cybersecurity and Infrastructure Security Agency (CISA) announced three new Industrial Control Systems (ICS)...

Security Researchers Discover Critical RCE Vulnerability, Earned $40,000 Bounty

Cybersecurity researchers Abdullah Nawaf and Orwa Atyat, successfully escalated a limited path traversal vulnerability...

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...