Cisco has launched patches to address a higher-severity security flaw impacting its Safe Shopper program that could be exploited by a risk actor to open a VPN session with that of a focused consumer.
The networking equipment firm explained the vulnerability, tracked as CVE-2024-20337 (CVSS rating: 8.2), as permitting an unauthenticated, distant attacker to perform a carriage return line feed (CRLF) injection attack from a consumer.
Arising as a final result of inadequate validation of person-equipped enter, a risk actor could leverage the flaw to trick a user into clicking on a specifically crafted hyperlink though creating a VPN session.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
“A thriving exploit could let the attacker to execute arbitrary script code in the browser or obtain sensitive, browser-dependent details, including a valid SAML token,” the company reported in an advisory.
“The attacker could then use the token to build a distant obtain VPN session with the privileges of the influenced person. Particular person hosts and providers driving the VPN headend would even now have to have supplemental qualifications for prosperous accessibility.”
The vulnerability impacts Secure Customer for Windows, Linux, and macOS, and has been tackled in the adhering to variations –
- Previously than 4.10.04065 (not vulnerable)
- 4.10.04065 and later (preset in 4.10.08025)
- 5. (migrate to a fastened launch)
- 5.1 (fastened in 5.1.2.42)
Amazon security researcher Paulos Yibelo Mesfin has been credited with getting and reporting the flaw, telling The Hacker News that the shortcoming will allow attackers to obtain neighborhood internal networks when a target visits a site under their regulate.
Cisco has also revealed fixes for CVE-2024-20338 (CVSS rating: 7.3), one more higher-severity flaw in Secure Customer for Linux that could allow an authenticated, local attacker to elevate privileges on an afflicted product. It has been fixed in model 5.1.2.42.
“An attacker could exploit this vulnerability by copying a malicious library file to a distinct directory in the filesystem and persuading an administrator to restart a precise system,” it reported. “A thriving exploit could let the attacker to execute arbitrary code on an impacted product with root privileges.”
Located this short article appealing? Stick to us on Twitter and LinkedIn to examine additional exclusive content we article.
Some sections of this report are sourced from:
thehackernews.com