CVE-2012-2494
Published Jun 20, 2012
Last updated 12 years ago
Overview
- Description
- The VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 2.x before 2.5 MR6 and 3.x before 3.0 MR8 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtw48681.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B522088-2084-491B-98F0-3E3CCD88131F" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA179B71-AC81-4587-8FB1-0466B2550975" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "210B66BB-4E2C-4D9E-BFBB-69916A42287C" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.128:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B77EB2C9-BACE-46EA-AA72-FF1C7EB1A5F4" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.133:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06527370-E73A-40FF-8E02-E0337536C7C1" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.136:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A617295C-F518-4BC7-8442-E476448D8F01" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.2.140:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E71A1D6B-8E87-4E3A-A1AE-DE44C2C348F9" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8AD6158-17AB-443D-8EC1-5FDE5852CAEC" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.3.185:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BBF395D-9E90-44C1-8E99-3631FFF24487" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.3.254:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E874C1CB-5F13-45DE-98EF-48C9DCC0DA80" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.3.2016:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "184A5DAA-9BDB-4C2D-80DC-E2E21356676A" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB04F55C-D373-42FF-8CEE-88762BA1BD62" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.4.0202:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B1E5D16-BD4E-417C-851B-AEC74D1F84FC" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.4.1012:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B9822AE-2ACE-424A-BB03-4457923E812E" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D85B4988-85C9-4E28-B526-862B6EB8A436" }, { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F1A7236-46E3-487A-998B-4D72A5EEA004" } ], "operator": "OR" } ] } ]