Vulnerability Description
Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to gain privileges via crafted IPC messages that trigger use of root privileges for a software-package installation, aka Bug ID CSCus79385.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Anyconnect Secure Mobility Client | <= 4.0\(.00051\) |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/viewAlert.x?alertId=37860Vendor Advisory
- http://www.securitytracker.com/id/1031933
- http://tools.cisco.com/security/center/viewAlert.x?alertId=37860Vendor Advisory
- http://www.securitytracker.com/id/1031933
FAQ
What is CVE-2015-0662?
CVE-2015-0662 is a vulnerability with a CVSS score of 7.2 (HIGH). Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to gain privileges via crafted IPC messages that trigger use of root privileges for a software-package installation, ...
How severe is CVE-2015-0662?
CVE-2015-0662 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-0662?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Anyconnect Secure Mobility Client.