FKIE_CVE-2007-1066
Vulnerability from fkie_nvd - Published: 2007-02-22 01:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client use an insecure default Discretionary Access Control Lists (DACL) for the connection client GUI, which allows local users to gain privileges by injecting "a thread under ConnectionClient.exe," aka CSCsg20558.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | secure_services_client | 4.0 | |
| cisco | secure_services_client | 4.0.5 | |
| cisco | secure_services_client | 4.0.51 | |
| cisco | security_agent | 5.0 | |
| cisco | security_agent | 5.1 | |
| cisco | trust_agent | 1.0 | |
| cisco | trust_agent | 2.0 | |
| cisco | trust_agent | 2.0.1 | |
| cisco | trust_agent | 2.1 | |
| meetinghouse | aegis_secureconnect_client | windows_platform |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_services_client:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BDEFEA3C-0595-4A62-8ACA-EBC364BFAEBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:secure_services_client:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3802F8EB-A1B9-42ED-B18F-6DDDE66D1DBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:secure_services_client:4.0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "63567540-B390-41DB-B3C8-C6F5E47914A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:security_agent:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E171031D-51C1-41BB-96E4-DFFF0C36B74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:security_agent:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6DD0915-7671-42CD-8DF3-0B685389C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:trust_agent:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE07274-FF2E-4D38-8E7A-68535BA3B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:trust_agent:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A548227E-0736-44B4-AB8B-930D5B7FC5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:trust_agent:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEDB26D-F1DC-4B90-824B-B03EDE92C27A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:trust_agent:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "957BB8CB-A3E9-4FB0-A60D-864FD14371C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:meetinghouse:aegis_secureconnect_client:windows_platform:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7A9BA8-B2C9-417A-86FA-1672EA9886BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client use an insecure default Discretionary Access Control Lists (DACL) for the connection client GUI, which allows local users to gain privileges by injecting \"a thread under ConnectionClient.exe,\" aka CSCsg20558."
},
{
"lang": "es",
"value": "Cisco Secure Services Client (CSSC) versiones 4.x, Trust Agent versiones 1.x y 2.x, Cisco Security Agent (CSA) versiones 5.0 y 5.1 (cuando ha sido desplegado un Trust Agent vulnerable), y el Meetinghouse AEGIS SecureConnect Client, usan una Discretionary Access Control Lists (DACL) predeterminada y no segura para la interfaz gr\u00e1fica de usuario (GUI) de conexi\u00f3n cliente, lo que permite a usuarios locales alcanzar privilegios inyectando \"a thread under ConnectionClient.exe,\" tambi\u00e9n se conoce como CSCsg20558."
}
],
"id": "CVE-2007-1066",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-02-22T01:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/33047"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24258"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22648"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017683"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017684"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0690"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32625"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/33047"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24258"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017683"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017684"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0690"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32625"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…