Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.1432 Cisco AnyConnect Local Privilege Escalation Vulnerability 8 June 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco AnyConnect Publisher: Cisco Systems Operating System: Windows Impact/Access: Administrator Compromise -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-6638 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Advisory: Cisco AnyConnect Local Privilege Escalation Vulnerability Advisory ID: cisco-sa-20170607-anyconnect Revision: 1.0 For Public Release: 2017 June 7 16:00 GMT Last Updated: 2017 June 7 16:00 GMT CVE ID(s): CVE-2017-6638 CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H +--------------------------------------------------------------------- Summary ======= A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect"] - -----BEGIN PGP SIGNATURE----- iQKBBAEBAgBrBQJZOCSVZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHkj+hAAsbjiGSK3eqbFR8wm tDYmVzo7mhjan646GF4v4/pr/3Z1ZRARCU/V67bZzIfgF492S9MvDXmaqc2YMB5C h3YgFtmnMg033v9fl5XopIZfWji6kRarRc+MtiTu/rSGonmewgTJHTMX9tQFx7RD 9X0QC3l5zGZ3rf7p2pbNbxzMUq7GQgYi8c8gum79MzJ4krytGrv4krGjVnINMhdM uEvBZhAtVusaUX1SHTtmXAc/xhq1aeSB8w6NGniCoPkCu4+areAuV+t8JoFA/PKF fhM36oqSQmuIKH4cC9TEioUBVriFRKewSHDvBbUc8xJp7L4pxp4EKwy2wQOp45Qv MynQ4MfKe3dHRHyByxZfCqb8MsrpaK+FAZWv4kATAXdESBe0GfAzBnXYkAXQzrts ZtT7mCmVb3I2TIXi4Cr1OW0hOlSCIWWEzArTIalaSeYPbDSHxxKhn5YyJ4cvMbY8 lJOMxGXbHkThi0K9waafBi6YWI6yINwL110+d/hyr26IGvsmYN9qAGMaUEX8wFIc QgJ0L6IkdlEZ2KFLkO6dD4fovEG2G/haOFgdHA1gfIo0O7f7cz+GbsATviz4mOSz zeCRsmgfwM0x0Keiokumly3gN8JfMBoECfkus9cRm9ImYOomMk1WsCdnTWMslFOA VxvuU/G3bTdnkuCHchPldbNMI5g= =HRqJ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWTirw4x+lLeg9Ub1AQjIsw/8CXmjWb30SgtXKai9XznyKJnZChujCYFY CZcYeZ6y9WiyY7MzixOJfxbNomXnna+H++AJec8/x8I5dJ926JyDDDIv4FW/5CfP MXuGtTaQPoFmG+jD75Oc0P4Fy4zeLmfC+Rl2GOmdq/MpP1uf1COMlypemsqHIQpt c4dIEI+txzDrLolMIXQG+iguvtsWhjPyHz7BEk1rbka3RDVlCUUfQTgWcDd98k6X uUOQpTXKCOckO8vGdzXf2WMyXm9rT6IRcTnLzUalRpAS9ykcofv+pLNPNpUiGAtI c5U2ZYkkX3Y4EzqoS6QRgL35IqZ5bTKZhmJGbcytaRs+qDu5skaLKtWlxdCRzqgw OMEoCbLlKTDf/0PINIZ6cqiufVvoyYr9xfUtzCXGVgeg7kv0BD4t0Vq8aiMdqmL5 vVnbYiYziWsp1xnNvAU5rFlEi8RUgJtQP+B9dqolcZ/VJjddJe7vxSmcCekUqjZg pcM1zYjBD38cPMu3eqLl88XMShEw477oQlQ496V5QeryvTdIQ0Eagut9Y8pWg3us DIjTbbVsTPDcRzqoLbfU4n0//YHv1iRGdcgDrR+kQm3wtiaYyS2hYv9Omln6sU5k pOgyK/dh7BlV37kW6thzzGJkmf/4HLeUnGOxbS22J+HOSnyYS5X4ri5A2hEg/XXq OfNg+X5xTUg= =uarP -----END PGP SIGNATURE-----