iTnews Asia
  • Home
  • News
  • Security

Exploit emerges for Cisco VPN client vulnerability

Exploit emerges for Cisco VPN client vulnerability

Arbitrary file deletion created privilege escalation vector.

By Richard Chirgwin on Jun 22, 2023 11:34AM

A security researcher has published an exploit for a Cisco vulnerability that was patched earlier this month.

The vulnerability, CVE-2023-20178, is a privilege escalation bug.

In its advisory, Cisco explained that “a vulnerability in the client update process of Cisco AnyConnect secure mobility client software for Windows, and Cisco Secure Client software for Windows, could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM.

"The client update process is executed after a successful VPN connection is established," the vendor stated.

“This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. 

“An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process.

"A successful exploit could allow the attacker to execute code with SYSTEM privileges.”

Cisco attributed discovery of the vulnerability to Filip Dragovic, who has now posted a proof-of-concept to GitHub.

Dragovic said the problem exists in the vpndownloader.exe process, which updates the client software on launch.

The updater creates a temp directory which is deleted if there are no updates to run.

“This behaviour can be abused to perform arbitrary file delete as NT Authority\SYSTEM account,” Dragovic wrote.

“Arbitrary file delete is then used to spawn system cmd processes by abusing windows installer behaviour."

The arbitrary delete can be used for privilege escalation, for example, by removing a high-privilege directory and creating a low-privilege directory with the same name, as the Zero Day Initiative describes in this article.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
anyconnect cisco security

Related Articles

  • Five tips a CIO or CSO should know to stop employee-driven IP theft
  • StarHub launches app to protect customers from scam calls and SMS
  • Beware the rise of ‘vishing’ as a cyber threat in APAC
  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Five tips a CIO or CSO should know to stop employee-driven IP theft

Five tips a CIO or CSO should know to stop employee-driven IP theft

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

Beware the rise of ‘vishing’ as a cyber threat in APAC

Beware the rise of ‘vishing’ as a cyber threat in APAC

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.