• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisco issues patch for high severity vpn hijacking bug in secure

Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

You are here: Home / General Cyber Security News / Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client
March 8, 2024

Cisco has launched patches to address a higher-severity security flaw impacting its Safe Shopper program that could be exploited by a risk actor to open a VPN session with that of a focused consumer.

The networking equipment firm explained the vulnerability, tracked as CVE-2024-20337 (CVSS rating: 8.2), as permitting an unauthenticated, distant attacker to perform a carriage return line feed (CRLF) injection attack from a consumer.

Arising as a final result of inadequate validation of person-equipped enter, a risk actor could leverage the flaw to trick a user into clicking on a specifically crafted hyperlink though creating a VPN session.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

“A thriving exploit could let the attacker to execute arbitrary script code in the browser or obtain sensitive, browser-dependent details, including a valid SAML token,” the company reported in an advisory.

“The attacker could then use the token to build a distant obtain VPN session with the privileges of the influenced person. Particular person hosts and providers driving the VPN headend would even now have to have supplemental qualifications for prosperous accessibility.”

The vulnerability impacts Secure Customer for Windows, Linux, and macOS, and has been tackled in the adhering to variations –

  • Previously than 4.10.04065 (not vulnerable)
  • 4.10.04065 and later (preset in 4.10.08025)
  • 5. (migrate to a fastened launch)
  • 5.1 (fastened in 5.1.2.42)

Amazon security researcher Paulos Yibelo Mesfin has been credited with getting and reporting the flaw, telling The Hacker News that the shortcoming will allow attackers to obtain neighborhood internal networks when a target visits a site under their regulate.

Cybersecurity

Cisco has also revealed fixes for CVE-2024-20338 (CVSS rating: 7.3), one more higher-severity flaw in Secure Customer for Linux that could allow an authenticated, local attacker to elevate privileges on an afflicted product. It has been fixed in model 5.1.2.42.

“An attacker could exploit this vulnerability by copying a malicious library file to a distinct directory in the filesystem and persuading an administrator to restart a precise system,” it reported. “A thriving exploit could let the attacker to execute arbitrary code on an impacted product with root privileges.”

Located this short article appealing? Stick to us on Twitter  and LinkedIn to examine additional exclusive content we article.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «qemu emulator exploited as tunneling tool to breach company network QEMU Emulator Exploited as Tunneling Tool to Breach Company Network
Next Post: Secrets Sensei: Conquering Secrets Management Challenges secrets sensei: conquering secrets management challenges»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.