• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisco issues patch for high severity vpn hijacking bug in secure

Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

You are here: Home / General Cyber Security News / Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client
March 8, 2024

Cisco has launched patches to address a higher-severity security flaw impacting its Safe Shopper program that could be exploited by a risk actor to open a VPN session with that of a focused consumer.

The networking equipment firm explained the vulnerability, tracked as CVE-2024-20337 (CVSS rating: 8.2), as permitting an unauthenticated, distant attacker to perform a carriage return line feed (CRLF) injection attack from a consumer.

Arising as a final result of inadequate validation of person-equipped enter, a risk actor could leverage the flaw to trick a user into clicking on a specifically crafted hyperlink though creating a VPN session.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

“A thriving exploit could let the attacker to execute arbitrary script code in the browser or obtain sensitive, browser-dependent details, including a valid SAML token,” the company reported in an advisory.

“The attacker could then use the token to build a distant obtain VPN session with the privileges of the influenced person. Particular person hosts and providers driving the VPN headend would even now have to have supplemental qualifications for prosperous accessibility.”

The vulnerability impacts Secure Customer for Windows, Linux, and macOS, and has been tackled in the adhering to variations –

  • Previously than 4.10.04065 (not vulnerable)
  • 4.10.04065 and later (preset in 4.10.08025)
  • 5. (migrate to a fastened launch)
  • 5.1 (fastened in 5.1.2.42)

Amazon security researcher Paulos Yibelo Mesfin has been credited with getting and reporting the flaw, telling The Hacker News that the shortcoming will allow attackers to obtain neighborhood internal networks when a target visits a site under their regulate.

Cybersecurity

Cisco has also revealed fixes for CVE-2024-20338 (CVSS rating: 7.3), one more higher-severity flaw in Secure Customer for Linux that could allow an authenticated, local attacker to elevate privileges on an afflicted product. It has been fixed in model 5.1.2.42.

“An attacker could exploit this vulnerability by copying a malicious library file to a distinct directory in the filesystem and persuading an administrator to restart a precise system,” it reported. “A thriving exploit could let the attacker to execute arbitrary code on an impacted product with root privileges.”

Located this short article appealing? Stick to us on Twitter  and LinkedIn to examine additional exclusive content we article.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «qemu emulator exploited as tunneling tool to breach company network QEMU Emulator Exploited as Tunneling Tool to Breach Company Network
Next Post: Secrets Sensei: Conquering Secrets Management Challenges secrets sensei: conquering secrets management challenges»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.