Wednesday, May 7, 2025
HomeCiscoCisco has Fixed a six-month-Old Zero-day Vulnerability Found in the Cisco AnyConnect

Cisco has Fixed a six-month-Old Zero-day Vulnerability Found in the Cisco AnyConnect

Published on

SIEM as a Service

Follow Us on Google News

The Cisco Product Security Incident Response Team (PSIRT) has recently fixed a six-month-old zero-day vulnerability that is tracked as “CVE-2020-3556” in Cisco AnyConnect Security Client. 

This zero-day flaw allows any attackers to execute arbitrary code; so, the experts have strongly recommended all the users to update their client immediately.

AnyConnect is a VPN security client that was launched by Cisco, and the chief function of AnyConnect VPN is to expedite all its users (intending company employees) to work safely on any device. 

- Advertisement - Google News

No matter where the user is, as it allows all its users to work as usual using the laptops, and mobile devices provided by the company. 

AnyConnect simplifies and secures the terminal access to provide the necessary security measures to guarantee the constant security of the company or organization.

However, in the AnyConnect Secure Mobility Client Software releases 4.10.00093, and later this six-month-old zero-day vulnerability has been addressed.

Flaw Profile

Here we have mentioned all the details of this six-month-old zero-day vulnerability:-

  • CVE ID: CVE-2020-3556
  • CWE ID: CWE-20
  • Advisory ID: cisco-sa-anyconnect-ipc-KfQO9QhK
  • Cisco Bug IDs: CSCvv30103
  • CVSS Score: 7.3
  • Severity: High

This zero-day vulnerability actually detected in the inter-process communication (IPC) channel of the Cisco AnyConnect Secure Mobility Client. And this vulnerability is caused by the lack of authentication of the IPC listener.

To exploit this flaw any threat actor can send a specially crafted IPC message to the AnyConnect client IPC listener and allow that attacker to trick the user into executing malicious scripts on the infected system.

Apart from this, the security analysts at Cisco affirmed that:-

  • On the laptops used by a single user, this flaw is not exploitable.
  • This flaw is not remotely exploitable.
  • This vulnerability is not a privilege elevation exploit.
  • This security flaw is rated as high severity, as this has the ability to exploit the configurations.

Vulnerable Products

  • AnyConnect Secure Mobility Client for Windows
  • AnyConnect Secure Mobility Client for macOS
  • AnyConnect Secure Mobility Client for Linux

Determine Vulnerability

Below we have mentioned the locations where you can check the presence of this flaw:-

  • Windows:<DriveLetter>:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\
  • macOS: /opt/cisco/anyconnect/
  • Linux: /opt/cisco/anyconnect/

Mitigation

As a security measure, the analysts have recommended all the users who cannot immediately install the security updates to turn off the Auto-Update feature.

Moreover, they have also urged users to disable the Enable Scripting configuration setting on the devices where this setting is enabled. As they claimed that by doing so will reduce the attack surface.

Apart from this, if anyone somehow won’t able to upgrade their older versions to the newer version with all the security fixes, for them to apply the recommended workarounds Cisco have also provided the detailed upgradation guide.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Windows Deployment Services Hit by 0-Click UDP Flaw Leading to System Failures

A newly discovered pre-authentication denial-of-service (DoS) vulnerability in Microsoft’s Windows Deployment Services (WDS) exposes enterprise networks...

Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment

Commvault, a global leader in data protection and information management, has confirmed that a...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...