Lucian Constantin
CSO Senior Writer

Cisco patches vulnerabilities in VPN client, security appliances

news
Jun 21, 20122 mins

Cisco released security updates for AnyConnect Secure Mobility Client and several hardware security appliances

Networking equipment vendor Cisco Systems released multiple security updates on Wednesday to address vulnerabilities in its AnyConnect Secure Mobility Client, ASA 5500 Series Adaptive Security Appliances, Cisco Catalyst 6500 Series ASA Services Module and Cisco Application Control Engine (ACE) software.

The newly released versions of Cisco AnyConnect Secure Mobility Client — Cisco’s VPN and remote access product for businesses — address four vulnerabilities located in the software’s Web-based downloader components.

[ Learn how to secure your systems with Roger Grimes’ Security Adviser blog and Security Central newsletter, both from InfoWorld. ]

AnyConnect Secure Mobility Client updates can be distributed in several ways, one of which involves accessing a website that loads special ActiveX or Java-based downloader components. This is known as a WebLaunch-initiated deployment.

“During a malicious attack, any website that hosted a copy of the vulnerable component could masquerade as a trustworthy site and attempt to convince the user to instantiate the vulnerable component,” Cisco explained in a security advisory published on Wednesday.

Two of the vulnerabilities could allow an attacker to execute malicious code on a user’s system, while the other two could allow an attacker to downgrade the client to an older version.

One of the code execution vulnerabilities only affects older 64-bit Linux versions of the software. The other three affect Windows, Mac OS X and Linux versions alike.

The software updates for the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module address a vulnerability that could allow a remote, unauthenticated, attacker to force devices to reboot.

In order to be vulnerable to such an attack, the affected devices would have to run in transparent firewall mode, have IPv6 enabled and be configured to log message ID 110003, Cisco said in its corresponding advisory.

The Cisco ACE (Application Control Engine) security updates address a vulnerability that might cause an administrator to log into an unintended context (virtual instance), if an ACE appliance or module is running in multicontext mode and is configured with the same management IP address.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author