ID

VAR-201506-0299


CVE

CVE-2015-4211


TITLE

Windows Run on Cisco AnyConnect Secure Mobility Client Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2015-003267

DESCRIPTION

Cisco AnyConnect Secure Mobility Client 3.1(60) on Windows does not properly validate pathnames, which allows local users to gain privileges via a crafted INF file, aka Bug ID CSCus65862. A local attacker may exploit this issue to gain elevated system privileges on the device. This issue is being tracked by Cisco Bug ID CSCus65862. The vulnerability is caused by the program not validating the path name correctly

Trust: 1.98

sources: NVD: CVE-2015-4211 // JVNDB: JVNDB-2015-003267 // BID: 75373 // VULHUB: VHN-82172

AFFECTED PRODUCTS

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:3.1\(60\)

Trust: 1.6

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:3.1(60) (windows)

Trust: 0.8

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:3.1(60)

Trust: 0.3

sources: BID: 75373 // JVNDB: JVNDB-2015-003267 // CNNVD: CNNVD-201506-485 // NVD: CVE-2015-4211

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4211
value: HIGH

Trust: 1.0

NVD: CVE-2015-4211
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201506-485
value: HIGH

Trust: 0.6

VULHUB: VHN-82172
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-4211
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-82172
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-82172 // JVNDB: JVNDB-2015-003267 // CNNVD: CNNVD-201506-485 // NVD: CVE-2015-4211

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-82172 // JVNDB: JVNDB-2015-003267 // NVD: CVE-2015-4211

THREAT TYPE

local

Trust: 0.9

sources: BID: 75373 // CNNVD: CNNVD-201506-485

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201506-485

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003267

PATCH

title:39466url:http://tools.cisco.com/security/center/viewAlert.x?alertId=39466

Trust: 0.8

sources: JVNDB: JVNDB-2015-003267

EXTERNAL IDS

db:NVDid:CVE-2015-4211

Trust: 2.8

db:BIDid:75373

Trust: 1.4

db:SECTRACKid:1032704

Trust: 1.1

db:JVNDBid:JVNDB-2015-003267

Trust: 0.8

db:CNNVDid:CNNVD-201506-485

Trust: 0.6

db:VULHUBid:VHN-82172

Trust: 0.1

sources: VULHUB: VHN-82172 // BID: 75373 // JVNDB: JVNDB-2015-003267 // CNNVD: CNNVD-201506-485 // NVD: CVE-2015-4211

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39466

Trust: 2.0

url:http://www.securityfocus.com/bid/75373

Trust: 1.1

url:http://www.securitytracker.com/id/1032704

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4211

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4211

Trust: 0.8

url:http://www.cisco.com/en/us/products/ps10884/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-82172 // BID: 75373 // JVNDB: JVNDB-2015-003267 // CNNVD: CNNVD-201506-485 // NVD: CVE-2015-4211

CREDITS

Cisco

Trust: 0.3

sources: BID: 75373

SOURCES

db:VULHUBid:VHN-82172
db:BIDid:75373
db:JVNDBid:JVNDB-2015-003267
db:CNNVDid:CNNVD-201506-485
db:NVDid:CVE-2015-4211

LAST UPDATE DATE

2024-11-23T23:12:39.208000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-82172date:2016-12-29T00:00:00
db:BIDid:75373date:2015-06-23T00:00:00
db:JVNDBid:JVNDB-2015-003267date:2015-06-25T00:00:00
db:CNNVDid:CNNVD-201506-485date:2015-06-25T00:00:00
db:NVDid:CVE-2015-4211date:2024-11-21T02:30:38.537

SOURCES RELEASE DATE

db:VULHUBid:VHN-82172date:2015-06-24T00:00:00
db:BIDid:75373date:2015-06-23T00:00:00
db:JVNDBid:JVNDB-2015-003267date:2015-06-25T00:00:00
db:CNNVDid:CNNVD-201506-485date:2015-06-25T00:00:00
db:NVDid:CVE-2015-4211date:2015-06-24T10:59:07.243