var-201206-0087
Vulnerability from variot

The HostScan downloader implementation in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR8 and Cisco Secure Desktop before 3.6.6020 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtx74235. This older version of the client software may contain vulnerabilities which can be exploited by the attacker to perform further attacks. These issues are tracked by Cisco Bug IDs CSCtw48681 and CSCtx74235. Cisco AnyConnect Secure Mobility is a secure enterprise mobility solution. The vulnerability stems from not comparing the software timestamp provided by the installed software timestamp. Also known as Bug ID CSCtx74235

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201206-0087",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "3.5.1077"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "3.5.841"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "3.1.1"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "3.2"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.5"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.2.1"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.5.2001"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "3.4.2048"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "3.1.1.45"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "3.1.1.33"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4.1"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4.2"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.4"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.1.1.27"
      },
      {
        "model": "secure desktop",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.5.2008"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "3.0 mr8"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "3.x"
      },
      {
        "model": "secure desktop",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.5.2008"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0.629"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.5.3046"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.5.3041"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.5"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.254"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.185"
      },
      {
        "model": "anyconnect secure mobility client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "54108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2495"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cisco:anyconnect_secure_mobility_client",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:cisco:secure_desktop",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "gwslabs.com via Zero Day Initiative and Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "54108"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-2495",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2012-2495",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-55776",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-2495",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-2495",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201206-375",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-55776",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55776"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2495"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The HostScan downloader implementation in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR8 and Cisco Secure Desktop before 3.6.6020 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtx74235.  This older version of the client software may contain vulnerabilities  which can be exploited by the attacker to perform further attacks. \nThese issues are tracked by Cisco Bug IDs CSCtw48681 and CSCtx74235. Cisco AnyConnect Secure Mobility is a secure enterprise mobility solution. The vulnerability stems from not comparing the software timestamp provided by the installed software timestamp. Also known as Bug ID CSCtx74235",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2495"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "db": "BID",
        "id": "54108"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55776"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-2495",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-375",
        "trust": 0.7
      },
      {
        "db": "CISCO",
        "id": "20120620 MULTIPLE VULNERABILITIES IN CISCO ANYCONNECT SECURE MOBILITY CLIENT",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "19867",
        "trust": 0.6
      },
      {
        "db": "ZDI",
        "id": "ZDI-12-149",
        "trust": 0.3
      },
      {
        "db": "BID",
        "id": "54108",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-55776",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55776"
      },
      {
        "db": "BID",
        "id": "54108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2495"
      }
    ]
  },
  "id": "VAR-201206-0087",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55776"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:18:54.567000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20120620-ac",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac"
      },
      {
        "title": "26198",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=26198"
      },
      {
        "title": "Update Rollup for ActiveX Kill Bits (2736233)",
        "trust": 0.8,
        "url": "http://technet.microsoft.com/en-us/security/advisory/2736233"
      },
      {
        "title": "Java SE Development Kit 7, Update 9 (JDK 7u9)",
        "trust": 0.8,
        "url": "http://www.oracle.com/technetwork/java/javase/7u9-relnotes-1863279.html"
      },
      {
        "title": "Java SE Development Kit 6, Update 37 (JDK 6u37)",
        "trust": 0.8,
        "url": "http://www.oracle.com/technetwork/java/javase/6u37-relnotes-1863283.html"
      },
      {
        "title": "cisco-sa-20120620-ac",
        "trust": 0.8,
        "url": "http://www.cisco.com/cisco/web/support/JP/111/1115/1115492_cisco-sa-20120620-ac-j.html"
      },
      {
        "title": "ActiveX \u306e Kill Bit \u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7 (2736233)",
        "trust": 0.8,
        "url": "http://technet.microsoft.com/ja-jp/security/advisory/2736233"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55776"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2495"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120620-ac"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2495"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2495"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/19867"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      },
      {
        "trust": 0.3,
        "url": "http://technet.microsoft.com/en-us/security/advisory/2736233"
      },
      {
        "trust": 0.3,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-12-149/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55776"
      },
      {
        "db": "BID",
        "id": "54108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2495"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-55776"
      },
      {
        "db": "BID",
        "id": "54108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2495"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-06-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-55776"
      },
      {
        "date": "2012-06-20T00:00:00",
        "db": "BID",
        "id": "54108"
      },
      {
        "date": "2012-06-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "date": "2012-06-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      },
      {
        "date": "2012-06-20T20:55:02.590000",
        "db": "NVD",
        "id": "CVE-2012-2495"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-06-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-55776"
      },
      {
        "date": "2015-03-19T08:41:00",
        "db": "BID",
        "id": "54108"
      },
      {
        "date": "2012-12-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      },
      {
        "date": "2012-06-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      },
      {
        "date": "2024-11-21T01:39:09.153000",
        "db": "NVD",
        "id": "CVE-2012-2495"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco AnyConnect Secure Mobility Client and  Cisco Secure Desktop Vulnerabilities forced to downgrade",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002812"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-375"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…