Vulnerability Details : CVE-2011-2678
The Cisco VPN Client 5.0.7.0240 and 5.0.7.0290 on 64-bit Windows platforms uses weak permissions (NT AUTHORITY\INTERACTIVE:F) for cvpnd.exe, which allows local users to gain privileges by replacing this executable file with an arbitrary program, aka Bug ID CSCtn50645. NOTE: this vulnerability exists because of a CVE-2007-4415 regression.
Products affected by CVE-2011-2678
- cpe:2.3:a:cisco:vpn_client:5.0.7.0240:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:5.0.7.0290:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-2678
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2678
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:L/AC:L/Au:S/C:C/I:C/A:C |
3.1
|
10.0
|
NIST |
References for CVE-2011-2678
-
http://www.cisco.com/warp/public/707/cisco-sa-20070815-vpnclient.shtml
Local Privilege Escalation Vulnerabilities in Cisco VPN ClientVendor Advisory
-
http://www.securityfocus.com/archive/1/518638/100/0/threaded
SecurityFocus
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/68485
Cisco VPN Client cvpnd.exe privilege escalation CVE-2011-2678 Vulnerability Report
-
http://securityreason.com/securityalert/8297
NGS00051 Technical Advisory: Cisco VPN Client Privilege Escalation - CXSecurity.com
-
http://isc.sans.edu/diary.html?storyid=11125
InfoSec Handlers Diary Blog - Deja-Vu: Cisco VPN Windows Client Privilege Escalation
Jump to