iTnews Asia
  • Home
  • News
  • Security

Exploit emerges for Cisco VPN client vulnerability

Exploit emerges for Cisco VPN client vulnerability

Arbitrary file deletion created privilege escalation vector.

By Richard Chirgwin on Jun 22, 2023 11:34AM

A security researcher has published an exploit for a Cisco vulnerability that was patched earlier this month.

The vulnerability, CVE-2023-20178, is a privilege escalation bug.

In its advisory, Cisco explained that “a vulnerability in the client update process of Cisco AnyConnect secure mobility client software for Windows, and Cisco Secure Client software for Windows, could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM.

"The client update process is executed after a successful VPN connection is established," the vendor stated.

“This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. 

“An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process.

"A successful exploit could allow the attacker to execute code with SYSTEM privileges.”

Cisco attributed discovery of the vulnerability to Filip Dragovic, who has now posted a proof-of-concept to GitHub.

Dragovic said the problem exists in the vpndownloader.exe process, which updates the client software on launch.

The updater creates a temp directory which is deleted if there are no updates to run.

“This behaviour can be abused to perform arbitrary file delete as NT Authority\SYSTEM account,” Dragovic wrote.

“Arbitrary file delete is then used to spawn system cmd processes by abusing windows installer behaviour."

The arbitrary delete can be used for privilege escalation, for example, by removing a high-privilege directory and creating a low-privilege directory with the same name, as the Zero Day Initiative describes in this article.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
anyconnect cisco security

Related Articles

  • Beware the pitfalls of using a ‘DIY security’ approach
  • AI transforms cyberattacks, but human trust remains the weakest link
  • How severe will ransomware attacks become in 2026?
  • Identity is now the new cybersecurity battlefield
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Beware the pitfalls of using a ‘DIY security’ approach

Beware the pitfalls of using a ‘DIY security’ approach

AI transforms cyberattacks, but human trust remains the weakest link

AI transforms cyberattacks, but human trust remains the weakest link

Zuellig Pharma launches Asia's first healthcare data exchange platform

Zuellig Pharma launches Asia's first healthcare data exchange platform

Toyota's Indian unit warns of a possible customer data breach

Toyota's Indian unit warns of a possible customer data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.