The VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 2.x prior to 2.5 MR6 and 3.x prior to 3.0 MR8 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote malicious users to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtw48681.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco anyconnect secure mobility client 2.0 |
||
cisco anyconnect secure mobility client 2.1 |
||
cisco anyconnect secure mobility client 2.2 |
||
cisco anyconnect secure mobility client 2.2.128 |
||
cisco anyconnect secure mobility client 2.2.133 |
||
cisco anyconnect secure mobility client 2.2.136 |
||
cisco anyconnect secure mobility client 2.2.140 |
||
cisco anyconnect secure mobility client 2.3 |
||
cisco anyconnect secure mobility client 2.3.185 |
||
cisco anyconnect secure mobility client 2.3.254 |
||
cisco anyconnect secure mobility client 2.3.2016 |
||
cisco anyconnect secure mobility client 2.4 |
||
cisco anyconnect secure mobility client 2.4.0202 |
||
cisco anyconnect secure mobility client 2.4.1012 |
||
cisco anyconnect secure mobility client 2.5 |
||
cisco anyconnect secure mobility client 3.0 |