Cisco Secure Client sérülékenysége
Angol cím: Cisco Secure Client vulnerability
Publikálás dátuma: 2024.03.06.
Utolsó módosítás dátuma: 2024.03.07.
Leírás
A program CRLF-t használ speciális elemként (pl. sorszeparálás) de nem, vagy nem megfelelően semlegesíti a CRLF szekvenciákat a bemeneten.
Leírás forrása: CWE-93Elemzés leírás
Eredeti nyelven: A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
Elemzés leírás forrása: CVE-2024-20337Hatás
CVSS3.1 Súlyosság és Metrika
Base score: 8.2 (Magas)
Vector: AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
Impact Score: 4.7
Exploitability Score: 2.8
Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope (S): Changed
Confidentiality Impact (C): High
Integrity Impact (I): Low
Availability Impact (A): None
Sérülékeny szoftverek
Secure Client for Linux
Secure Client for macOS
Secure Client for Windows