![]() There are no workarounds that address this vulnerability. The attacker would need to have valid user credentials to exploit this vulnerability.Ĭisco has released software updates that address this vulnerability. ![]() A successful exploit could allow the attacker to read arbitrary files on the underlying OS of the affected device. An attacker could exploit this vulnerability by sending a crafted command from the local CLI to the application. The vulnerability is due to insufficient file permission restrictions. C:ProgramDataCiscoCisco An圜onnect Secure Mobility ClientProfile. ![]() ![]() A vulnerability in the upgrade component of Cisco An圜onnect Secure Mobility Client could allow an authenticated, local attacker with low privileges to read arbitrary files on the underlying operating system (OS) of an affected device. On a newly deployed client, you can see I only have one entry, it remembers the last one I connected to, there is no connection profile saved yet, (they live in) Windows 7/8/10.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |