A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established.

This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.2548}

epss

{'score': 0.25969}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-02T09:05:34.960Z

Reserved: 2022-10-27T00:00:00

Link: CVE-2023-20178

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-06-28T15:15:09.880

Modified: 2024-11-21T07:40:45.287

Link: CVE-2023-20178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.