An attacker could exploit this vulnerability by overwriting the temporary file before it is accessed for execution. This vulnerability exists because a temporary file with insecure permissions is created during the uninstall process. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.ĭetails about the vulnerabilities are as follows.Ĭisco An圜onnect Secure Mobility Client for Windows Uninstall Executable Hijacking VulnerabilityĪ vulnerability in the uninstall process of Cisco An圜onnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform an executable hijacking attack on an affected device. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. The vulnerabilities are not dependent on one another.
0 Comments
Leave a Reply. |