CVE-2012-2495
Published Jun 20, 2012
Last updated 12 years ago
Overview
- Description
- The HostScan downloader implementation in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR8 and Cisco Secure Desktop before 3.6.6020 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtx74235.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F1A7236-46E3-487A-998B-4D72A5EEA004" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "404A7711-C463-4471-A6BD-DD99B3795312", "versionEndIncluding": "3.5.2008" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EE6B79A-FD31-4637-BE22-EEADF63B94FF" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F2F8EA5-8DEF-48D0-9E7F-6047D4AECC5C" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.1.1.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59D841B0-3D1B-4F1C-87F1-D0355955E49C" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.1.1.33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F13E414E-E56E-496E-A952-F93DCF1B1BDC" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.1.1.45:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21F5DFB0-21F4-45F7-B4AF-000B24DEA596" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D7A8878-2E0F-4140-86DF-75999B47E4F5" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4932BA9E-4156-4445-93E9-7A9F1D81090B" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3497EB29-C406-44C1-AB28-0DDC4E79A9D9" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C63D54D-6424-4767-9832-41E7F0B1D1E9" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4D4CF6F-2F81-45B0-9B5B-C8D79E74D6F4" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA0286A4-6011-41DF-B607-44CFBBFD437F" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.4.2048:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE277431-4101-4C0F-91DB-A1C15C0344FF" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4142FB07-D5F0-4209-B0DE-67B768D7BDAC" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.5.841:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85641AF5-7A5B-4146-9806-E055420DB3AD" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.5.1077:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D5FC538-64F7-4F3D-9FAE-82D5015737DE" }, { "criteria": "cpe:2.3:a:cisco:secure_desktop:3.5.2001:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F72D901-C62C-41A0-8D68-72CB9508E507" } ], "operator": "OR" } ] } ]