

For more information, see Meet Cisco Secure.Ĭisco has released free software updates that address the vulnerability described in this advisory. This advisory is available at the following link:Īttention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. There are no workarounds that address this vulnerability. A successful exploit could allow the attacker to execute code with SYSTEM privileges.Ĭisco has released software updates that address this vulnerability.

An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. The client update process is executed after a successful VPN connection is established.

A vulnerability in the client update process of Cisco An圜onnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM.
