ID

VAR-202008-0803


CVE

CVE-2020-3435


TITLE

Windows for Cisco AnyConnect Secure Mobility Client Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-009567

DESCRIPTION

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to modify VPN profile files. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to the fact that the program does not fully verify the input submitted by the user

Trust: 1.8

sources: NVD: CVE-2020-3435 // JVNDB: JVNDB-2020-009567 // VULHUB: VHN-181560 // VULMON: CVE-2020-3435

AFFECTED PRODUCTS

vendor:ciscomodel:anyconnect secure mobility clientscope:lteversion:4.9.00086

Trust: 1.0

vendor:ciscomodel:anyconnect secure mobility clientscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-009567 // NVD: CVE-2020-3435

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3435
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3435
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-009567
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202008-140
value: MEDIUM

Trust: 0.6

VULHUB: VHN-181560
value: LOW

Trust: 0.1

VULMON: CVE-2020-3435
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-3435
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-009567
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181560
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3435
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: JVNDB-2020-009567
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181560 // VULMON: CVE-2020-3435 // JVNDB: JVNDB-2020-009567 // CNNVD: CNNVD-202008-140 // NVD: CVE-2020-3435 // NVD: CVE-2020-3435

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-181560 // JVNDB: JVNDB-2020-009567 // NVD: CVE-2020-3435

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202008-140

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202008-140

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009567

PATCH

title:cisco-sa-anyconnect-profile-7u3PERKFurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-profile-7u3PERKF

Trust: 0.8

title:Cisco: Cisco AnyConnect Secure Mobility Client for Windows Profile Modification Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-anyconnect-profile-7u3PERKF

Trust: 0.1

title:CVE-2020-3435url:https://github.com/AlAIAL90/CVE-2020-3435

Trust: 0.1

title:CVE-2020-3433url:https://github.com/goichot/CVE-2020-3433

Trust: 0.1

sources: VULMON: CVE-2020-3435 // JVNDB: JVNDB-2020-009567

EXTERNAL IDS

db:NVDid:CVE-2020-3435

Trust: 2.6

db:JVNDBid:JVNDB-2020-009567

Trust: 0.8

db:CNNVDid:CNNVD-202008-140

Trust: 0.7

db:AUSCERTid:ESB-2020.2680

Trust: 0.6

db:AUSCERTid:ESB-2020.2680.2

Trust: 0.6

db:VULHUBid:VHN-181560

Trust: 0.1

db:VULMONid:CVE-2020-3435

Trust: 0.1

sources: VULHUB: VHN-181560 // VULMON: CVE-2020-3435 // JVNDB: JVNDB-2020-009567 // CNNVD: CNNVD-202008-140 // NVD: CVE-2020-3435

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-anyconnect-profile-7u3perkf

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2020-3435

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3435

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-anyconnect-dos-fexq4tav

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-anyconnect-dll-f26wwjw

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-anyconnect-secure-mobility-client-for-windows-privilege-escalation-via-profile-modification-33015

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2680.2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2680/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://github.com/alaial90/cve-2020-3435

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/goichot/cve-2020-3433

Trust: 0.1

sources: VULHUB: VHN-181560 // VULMON: CVE-2020-3435 // JVNDB: JVNDB-2020-009567 // CNNVD: CNNVD-202008-140 // NVD: CVE-2020-3435

SOURCES

db:VULHUBid:VHN-181560
db:VULMONid:CVE-2020-3435
db:JVNDBid:JVNDB-2020-009567
db:CNNVDid:CNNVD-202008-140
db:NVDid:CVE-2020-3435

LAST UPDATE DATE

2024-11-23T21:59:07.075000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181560date:2021-08-06T00:00:00
db:VULMONid:CVE-2020-3435date:2021-08-06T00:00:00
db:JVNDBid:JVNDB-2020-009567date:2020-11-13T07:08:08
db:CNNVDid:CNNVD-202008-140date:2020-08-21T00:00:00
db:NVDid:CVE-2020-3435date:2024-11-21T05:31:03.753

SOURCES RELEASE DATE

db:VULHUBid:VHN-181560date:2020-08-17T00:00:00
db:VULMONid:CVE-2020-3435date:2020-08-17T00:00:00
db:JVNDBid:JVNDB-2020-009567date:2020-11-13T07:08:08
db:CNNVDid:CNNVD-202008-140date:2020-08-05T00:00:00
db:NVDid:CVE-2020-3435date:2020-08-17T18:15:13.197