A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 08 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-10-24'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2025-07-30T01:45:48.398Z

Reserved: 2019-12-12T00:00:00.000Z

Link: CVE-2020-3153

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.700Z

cve-icon NVD

Status : Analyzed

Published: 2020-02-19T20:15:15.113

Modified: 2025-02-24T15:34:56.417

Link: CVE-2020-3153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.