![]() There are no workarounds that address this vulnerability. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.Ĭisco has released software updates that address the vulnerability described in this advisory. This could include DLL Pre-loading, DLL Hijacking and other related attacks. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The vulnerability is due to the incorrect handling of directory paths. A vulnerability in the installer component of Cisco An圜onnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user supplied files to system level directories with system level privileges.
0 Comments
Leave a Reply. |