Article Details
Scrape Timestamp (UTC): 2024-03-08 08:13:21.685
Source: https://thehackernews.com/2024/03/cisco-issues-patch-for-high-severity.html
Original Article Text
Click to Toggle View
Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client. Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that of a targeted user. The networking equipment company described the vulnerability, tracked as CVE-2024-20337 (CVSS score: 8.2), as allowing an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. Arising as a result of insufficient validation of user-supplied input, a threat actor could leverage the flaw to trick a user into clicking on a specially crafted link while establishing a VPN session. "A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token," the company said in an advisory. "The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access." The vulnerability impacts Secure Client for Windows, Linux, and macOS, and has been addressed in the following versions - Amazon security researcher Paulos Yibelo Mesfin has been credited with discovering and reporting the flaw, telling The Hacker News that the shortcoming allows attackers to access local internal networks when a target visits a website under their control. Cisco has also published fixes for CVE-2024-20338 (CVSS score: 7.3), another high-severity flaw in Secure Client for Linux that could permit an authenticated, local attacker to elevate privileges on an affected device. It has been resolved in version 5.1.2.42. "An attacker could exploit this vulnerability by copying a malicious library file to a specific directory in the filesystem and persuading an administrator to restart a specific process," it said. "A successful exploit could allow the attacker to execute arbitrary code on an affected device with root privileges." State of AI in the Cloud 2024 Find out what 150,000+ cloud accounts revealed about the AI surge. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class threat intelligence from Censys Search.
Daily Brief Summary
Cisco has released updates to remedy a high-severity vulnerability in its Secure Client software which could let attackers hijack VPN sessions.
Identified as CVE-2024-20337 with a CVSS score of 8.2, the flaw is due to improper validation of user input and enables CRLF injection attacks.
Exploiting this flaw, an attacker can use a specially crafted link to execute arbitrary script code or access sensitive information such as SAML tokens.
The compromised SAML tokens could be used by the attacker to start a VPN session with the privileges of the affected user, although additional credentials are still required for deeper network access.
The vulnerability affects Secure Client versions for Windows, Linux, and macOS, and is fixed in the updated releases.
Researcher Paulos Yibelo Mesfin is credited with discovering the flaw and suggests that it could allow attackers to penetrate local internal networks.
Another separate high-severity issue, CVE-2024-20338, affecting Secure Client for Linux, was also patched. It allowed privilege escalation and has been fixed in version 5.1.2.42.