--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Cisco AnyConnect Secure Mobility Client Vulnerability' version: '1.0' number: '2020-058' date: 'December 8, 2020' --- # Summary Cisco released an advisory on the 4th of December regarding a vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software. It could allow an authenticated local attacker to cause a targeted AnyConnect user to execute a malicious script. # Technical Details The vulnerability was assigned *CVE-2020-3556* with a CVSS score of 7.3 [1]. The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener. A successful exploit could allow an attacker to cause the targeted AnyConnect user to execute a script. This script would execute with the privileges of the targeted AnyConnect user. # Products Affected This vulnerability affects all versions of the Cisco AnyConnect Secure Mobility Client Software for the following platforms if they have a vulnerable configuration: * AnyConnect Secure Mobility Client for Windows * AnyConnect Secure Mobility Client for MacOS * AnyConnect Secure Mobility Client for Linux This vulnerability does not affect Cisco AnyConnect Secure Mobility Client for the Apple iOS and Android platforms. # Recommendations Cisco will release free software updates that will address the vulnerability described in this advisory. CERT-EU recommends updating Cisco AnyConnect Secure Mobility Clients once an update is available. ## Workarounds The recommended workaround is to upgrade to *Release 4.9.04053* and edit the `AnyConnectLocalPolicy.xml` file to set `RestrictScriptWebDeploy` to **true**. Ensure that `BypassDownloader` is set to **false**. The new `AnyConnectLocalPolicy.xml` file would then be deployed to end machines using an out-of-band method of deployment. There are additional configuration settings for Release 4.9.04053 and later that are strongly recommended to be set for increased protection [2]. # References [1] [2]