Cisco Bug: CSCuq80367 - Cisco Secure Desktop Host Scanner Bypass
Sep 02, 2020
- Cisco AnyConnect Secure Mobility Client
Known Affected Releases
<B>Symptom:</B> Cisco Host Scan comprises a series of advanced executables that perform security checks on the local system to identify operating system, anti-virus and other system information. A vulnerability in Cisco Host Scan allows an authenticated, remote attacker to bypass Host Scan security posture checks and successfully establish an AnyConnect VPN session from a device that does not meet the company's defined VPN policies. Note: The attacker still needs to authenticate to the VPN headend device to successfully establish a VPN session and thus still requires valid VPN user credentials. <B>Conditions:</B> None.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases