CVE-2015-7600
Published Oct 6, 2015
Last updated 8 years ago
Overview
- Description
- Cisco VPN Client 5.x through 5.0.07.0440 uses weak permissions for vpnclient.ini, which allows local users to gain privileges by entering an arbitrary program name in the Command field of the ApplicationLauncher section.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4F8D296-8C41-4ACF-97A1-B046CE18C623" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A241A0DC-E0C0-40FF-825F-3BFD04EF05C4" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.01.0600:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58FB3744-3107-410F-8E03-228060A95018" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51BB77A8-9610-4622-855E-F41D4DE8BF98" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.02.0090:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7093F844-3939-481C-9D76-DC9812309474" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.2.0090:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB3D6BB1-BDCB-46A1-A213-17CB1F46683F" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.03.0530:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1845EE7-185C-4537-B968-10F1E20082B8" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.03.0560:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0D44782-3DD1-45DA-9457-8B6D07E12B5B" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.04.0300:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9FED413-4C1E-45C2-B2CC-5C70079B00F8" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDA1A681-3063-4894-BA84-846CFCE35D54" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.05.0290:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBC5508A-92AC-437A-A55E-2A864A757BFC" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7072DB27-CFE9-4D5D-A912-608A719E72CF" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.06.0160:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54DE7A64-BF7C-4062-9315-18AD3D5F6FD3" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34B077DB-FBD7-4B15-B682-5A8912A07727" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.7.0240:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15B23F91-9BA0-4C07-ACAC-315C846F2754" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.7.0290:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B348A7D4-6753-4464-B1B8-1B94E09F65B7" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.07.0290:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "465D80AD-7622-440F-BFF5-C94C62A3E905" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.07.0410:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F8659A2-717E-4D8B-8877-B0FACF39C599" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.07.0440:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32B0C059-A4A1-4F31-B561-F1611814004C" }, { "criteria": "cpe:2.3:a:cisco:vpn_client:5.0.7.0440:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "288C2815-C809-423E-AB62-BBE19F692F6E" } ], "operator": "OR" } ] } ]