CVE-2023-20241 (GCVE-0-2023-20241)

Vulnerability from cvelistv5 – Published: 2023-11-22 17:10 – Updated: 2025-06-05 14:23
VLAI?
Summary
Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.
CWE
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Secure Client Affected: 4.9.00086
Affected: 4.9.01095
Affected: 4.9.02028
Affected: 4.9.03047
Affected: 4.9.03049
Affected: 4.9.04043
Affected: 4.9.04053
Affected: 4.9.05042
Affected: 4.9.06037
Affected: 4.10.00093
Affected: 4.10.01075
Affected: 4.10.02086
Affected: 4.10.03104
Affected: 4.10.04065
Affected: 4.10.04071
Affected: 4.10.05085
Affected: 4.10.05095
Affected: 4.10.05111
Affected: 4.10.06079
Affected: 4.10.06090
Affected: 4.10.07061
Affected: 4.10.07062
Affected: 4.10.07073
Affected: 5.0.00238
Affected: 5.0.00529
Affected: 5.0.00556
Affected: 5.0.01242
Affected: 5.0.02075
Affected: 5.0.03072
Affected: 5.0.03076
Affected: 5.0.04032
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:35.856Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-accsc-dos-9SLzkZ8",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20241",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-05T14:22:24.777282Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-05T14:23:54.423Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Secure Client",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.9.00086"
            },
            {
              "status": "affected",
              "version": "4.9.01095"
            },
            {
              "status": "affected",
              "version": "4.9.02028"
            },
            {
              "status": "affected",
              "version": "4.9.03047"
            },
            {
              "status": "affected",
              "version": "4.9.03049"
            },
            {
              "status": "affected",
              "version": "4.9.04043"
            },
            {
              "status": "affected",
              "version": "4.9.04053"
            },
            {
              "status": "affected",
              "version": "4.9.05042"
            },
            {
              "status": "affected",
              "version": "4.9.06037"
            },
            {
              "status": "affected",
              "version": "4.10.00093"
            },
            {
              "status": "affected",
              "version": "4.10.01075"
            },
            {
              "status": "affected",
              "version": "4.10.02086"
            },
            {
              "status": "affected",
              "version": "4.10.03104"
            },
            {
              "status": "affected",
              "version": "4.10.04065"
            },
            {
              "status": "affected",
              "version": "4.10.04071"
            },
            {
              "status": "affected",
              "version": "4.10.05085"
            },
            {
              "status": "affected",
              "version": "4.10.05095"
            },
            {
              "status": "affected",
              "version": "4.10.05111"
            },
            {
              "status": "affected",
              "version": "4.10.06079"
            },
            {
              "status": "affected",
              "version": "4.10.06090"
            },
            {
              "status": "affected",
              "version": "4.10.07061"
            },
            {
              "status": "affected",
              "version": "4.10.07062"
            },
            {
              "status": "affected",
              "version": "4.10.07073"
            },
            {
              "status": "affected",
              "version": "5.0.00238"
            },
            {
              "status": "affected",
              "version": "5.0.00529"
            },
            {
              "status": "affected",
              "version": "5.0.00556"
            },
            {
              "status": "affected",
              "version": "5.0.01242"
            },
            {
              "status": "affected",
              "version": "5.0.02075"
            },
            {
              "status": "affected",
              "version": "5.0.03072"
            },
            {
              "status": "affected",
              "version": "5.0.03076"
            },
            {
              "status": "affected",
              "version": "5.0.04032"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system.\r\n\r These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "Out-of-bounds Read",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:58:29.398Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-accsc-dos-9SLzkZ8",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8"
        }
      ],
      "source": {
        "advisory": "cisco-sa-accsc-dos-9SLzkZ8",
        "defects": [
          "CSCwf92553"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20241",
    "datePublished": "2023-11-22T17:10:45.694Z",
    "dateReserved": "2022-10-27T18:47:50.370Z",
    "dateUpdated": "2025-06-05T14:23:54.423Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.00086:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03B6618B-2E98-480C-AF79-2A9E9BF29CB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.01095:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2CB76BE-7DD7-40D7-A7C7-DDA7079A286F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.02028:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C87CEF61-99F2-4845-9FDE-4B6ED62637C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.03047:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA80A4E4-061E-4578-B780-9540AE502E66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.03049:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"804366C1-F307-4DC2-9FEA-B4EB60790A32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.04043:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AD3244A-5CA8-496C-B189-BCD31B0E40C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.04053:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAB00A32-8571-4685-B448-690F8EE373D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.05042:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F97CC9FF-FDD3-46A1-9025-BAA83160A504\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.06037:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF8E83C4-9C5A-4D84-AB19-A4564BBB6625\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.00093:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FDBC52F-F851-4DC4-9DED-45F8689F2A00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.01075:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6D74511-0444-473C-96F7-751C2B9A6ADC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.02086:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D89BE767-38C2-4E92-83EB-09E23B48AAF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.03104:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC77CA23-5750-4E35-AD17-4FE0B351ECFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.04065:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDE66231-01C3-4807-AB7B-F2A3C2E2200D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.04071:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B003756D-7F3D-4FB9-B3EF-CEAA68334630\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.05085:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B06F4BD8-23D2-4C32-B090-F33D50BB5805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.05095:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EE93BD0-7AAD-4921-A6F1-22F1905F8870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.05111:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"222718F2-81E9-40BD-8B2D-ECD70CC423E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.06079:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1150AC7-8E86-471E-87DD-F4C0D0628261\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.06090:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585A3B8E-8FD1-4B01-9F82-1038BF50A0FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.07061:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61D0138A-EE54-420B-A11B-4580DD130FBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.07062:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D45B8E46-AE9E-44F6-B58E-5AF7A32D499B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:4.10.07073:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAB896B8-535A-494F-AA21-3DA56CD7A540\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:5.0.00238:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B7B74D9-7D43-48B2-AE6F-4FE75DB1DF61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:5.0.00529:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86B5EB44-F814-49AB-BAD2-3E02E9707377\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:5.0.00556:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C33CF946-24CD-471E-8448-445E629789BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:5.0.01242:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E39EE52-4A48-430E-A7A5-29276EE51B03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:5.0.02075:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"781CEBDC-3A42-47BA-8509-E35AB6BB56C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:5.0.03072:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADF3D714-0475-4E30-8245-159C5BA68F11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_client:5.0.03076:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA2D666F-5EBF-41B7-89C1-32BCF65DABEC\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system.\\r\\n\\r These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades en Cisco Secure Client Software, anteriormente AnyConnect Secure Mobility Client, podr\\u00edan permitir que un atacante local autenticado cause una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS) en un sistema afectado. Estas vulnerabilidades se deben a una lectura de memoria fuera de los l\\u00edmites de Cisco Secure Client Software. Un atacante podr\\u00eda aprovechar estas vulnerabilidades iniciando sesi\\u00f3n en un dispositivo afectado al mismo tiempo que otro usuario accede a Cisco Secure Client en el mismo sistema y luego enviando paquetes manipulados a un puerto en ese host local. Un exploit exitoso podr\\u00eda permitir al atacante bloquear el servicio del Agente VPN, provocando que no est\\u00e9 disponible para todos los usuarios del sistema. Para explotar estas vulnerabilidades, el atacante debe tener credenciales v\\u00e1lidas en un sistema multiusuario.\"}]",
      "id": "CVE-2023-20241",
      "lastModified": "2024-11-21T07:40:58.370",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
      "published": "2023-11-22T17:15:18.740",
      "references": "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-20241\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2023-11-22T17:15:18.740\",\"lastModified\":\"2024-11-21T07:40:58.370\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system.\\r\\n\\r These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades en Cisco Secure Client Software, anteriormente AnyConnect Secure Mobility Client, podr\u00edan permitir que un atacante local autenticado cause una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un sistema afectado. Estas vulnerabilidades se deben a una lectura de memoria fuera de los l\u00edmites de Cisco Secure Client Software. Un atacante podr\u00eda aprovechar estas vulnerabilidades iniciando sesi\u00f3n en un dispositivo afectado al mismo tiempo que otro usuario accede a Cisco Secure Client en el mismo sistema y luego enviando paquetes manipulados a un puerto en ese host local. Un exploit exitoso podr\u00eda permitir al atacante bloquear el servicio del Agente VPN, provocando que no est\u00e9 disponible para todos los usuarios del sistema. Para explotar estas vulnerabilidades, el atacante debe tener credenciales v\u00e1lidas en un sistema multiusuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.00086:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B6618B-2E98-480C-AF79-2A9E9BF29CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.01095:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2CB76BE-7DD7-40D7-A7C7-DDA7079A286F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.02028:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C87CEF61-99F2-4845-9FDE-4B6ED62637C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.03047:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA80A4E4-061E-4578-B780-9540AE502E66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.03049:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"804366C1-F307-4DC2-9FEA-B4EB60790A32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.04043:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD3244A-5CA8-496C-B189-BCD31B0E40C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.04053:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB00A32-8571-4685-B448-690F8EE373D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.05042:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F97CC9FF-FDD3-46A1-9025-BAA83160A504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.06037:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF8E83C4-9C5A-4D84-AB19-A4564BBB6625\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.00093:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDBC52F-F851-4DC4-9DED-45F8689F2A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.01075:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D74511-0444-473C-96F7-751C2B9A6ADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.02086:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D89BE767-38C2-4E92-83EB-09E23B48AAF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.03104:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC77CA23-5750-4E35-AD17-4FE0B351ECFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.04065:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE66231-01C3-4807-AB7B-F2A3C2E2200D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.04071:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B003756D-7F3D-4FB9-B3EF-CEAA68334630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.05085:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4BD8-23D2-4C32-B090-F33D50BB5805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.05095:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EE93BD0-7AAD-4921-A6F1-22F1905F8870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.05111:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"222718F2-81E9-40BD-8B2D-ECD70CC423E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.06079:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1150AC7-8E86-471E-87DD-F4C0D0628261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.06090:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585A3B8E-8FD1-4B01-9F82-1038BF50A0FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.07061:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D0138A-EE54-420B-A11B-4580DD130FBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.07062:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45B8E46-AE9E-44F6-B58E-5AF7A32D499B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:4.10.07073:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAB896B8-535A-494F-AA21-3DA56CD7A540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:5.0.00238:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7B74D9-7D43-48B2-AE6F-4FE75DB1DF61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:5.0.00529:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B5EB44-F814-49AB-BAD2-3E02E9707377\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:5.0.00556:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33CF946-24CD-471E-8448-445E629789BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:5.0.01242:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E39EE52-4A48-430E-A7A5-29276EE51B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:5.0.02075:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"781CEBDC-3A42-47BA-8509-E35AB6BB56C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:5.0.03072:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF3D714-0475-4E30-8245-159C5BA68F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_client:5.0.03076:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA2D666F-5EBF-41B7-89C1-32BCF65DABEC\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-01-25T16:58:29.398Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system.\\r\\n\\r These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.\"}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Secure Client\", \"versions\": [{\"version\": \"4.9.00086\", \"status\": \"affected\"}, {\"version\": \"4.9.01095\", \"status\": \"affected\"}, {\"version\": \"4.9.02028\", \"status\": \"affected\"}, {\"version\": \"4.9.03047\", \"status\": \"affected\"}, {\"version\": \"4.9.03049\", \"status\": \"affected\"}, {\"version\": \"4.9.04043\", \"status\": \"affected\"}, {\"version\": \"4.9.04053\", \"status\": \"affected\"}, {\"version\": \"4.9.05042\", \"status\": \"affected\"}, {\"version\": \"4.9.06037\", \"status\": \"affected\"}, {\"version\": \"4.10.00093\", \"status\": \"affected\"}, {\"version\": \"4.10.01075\", \"status\": \"affected\"}, {\"version\": \"4.10.02086\", \"status\": \"affected\"}, {\"version\": \"4.10.03104\", \"status\": \"affected\"}, {\"version\": \"4.10.04065\", \"status\": \"affected\"}, {\"version\": \"4.10.04071\", \"status\": \"affected\"}, {\"version\": \"4.10.05085\", \"status\": \"affected\"}, {\"version\": \"4.10.05095\", \"status\": \"affected\"}, {\"version\": \"4.10.05111\", \"status\": \"affected\"}, {\"version\": \"4.10.06079\", \"status\": \"affected\"}, {\"version\": \"4.10.06090\", \"status\": \"affected\"}, {\"version\": \"4.10.07061\", \"status\": \"affected\"}, {\"version\": \"4.10.07062\", \"status\": \"affected\"}, {\"version\": \"4.10.07073\", \"status\": \"affected\"}, {\"version\": \"5.0.00238\", \"status\": \"affected\"}, {\"version\": \"5.0.00529\", \"status\": \"affected\"}, {\"version\": \"5.0.00556\", \"status\": \"affected\"}, {\"version\": \"5.0.01242\", \"status\": \"affected\"}, {\"version\": \"5.0.02075\", \"status\": \"affected\"}, {\"version\": \"5.0.03072\", \"status\": \"affected\"}, {\"version\": \"5.0.03076\", \"status\": \"affected\"}, {\"version\": \"5.0.04032\", \"status\": \"affected\"}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Out-of-bounds Read\", \"type\": \"cwe\", \"cweId\": \"CWE-125\"}]}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8\", \"name\": \"cisco-sa-accsc-dos-9SLzkZ8\"}], \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"source\": {\"advisory\": \"cisco-sa-accsc-dos-9SLzkZ8\", \"discovery\": \"INTERNAL\", \"defects\": [\"CSCwf92553\"]}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T09:05:35.856Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8\", \"name\": \"cisco-sa-accsc-dos-9SLzkZ8\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-20241\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-05T14:22:24.777282Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-05T14:23:46.562Z\"}}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-20241\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"cisco\", \"dateReserved\": \"2022-10-27T18:47:50.370Z\", \"datePublished\": \"2023-11-22T17:10:45.694Z\", \"dateUpdated\": \"2025-06-05T14:23:54.423Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…