Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Cisco patches vulnerabilities in VPN client and security appliances

Cisco released security updates for AnyConnect Secure Mobility Client and several hardware security appliances

Article comments

Cisco has released multiple security updates to address vulnerabilities in its AnyConnect Secure Mobility Client, ASA 5500 Series Adaptive Security Appliances, Cisco Catalyst 6500 Series ASA Services Module and Cisco Application Control Engine (ACE) software.

New versions of Cisco AnyConnect Secure Mobility Client - the network equipment vendor's VPN and remote access product for businesses - address four vulnerabilities located in the software's web-based downloader components.

AnyConnect Secure Mobility Client updates can be distributed in several ways, one of which involves accessing a website that loads special ActiveX or Java-based downloader components. This is known as a WebLaunch-initiated deployment.

"During a malicious attack, any website that hosted a copy of the vulnerable component could masquerade as a trustworthy site and attempt to convince the user to instantiate the vulnerable component," Cisco explained in a security advisory.

Two of the vulnerabilities could allow an attacker to execute malicious code on a user's system, while the other two could allow an attacker to downgrade the client to an older version.

One of the code execution vulnerabilities only affects older 64-bit Linux versions of the software. The other three affect Windows, Mac OS X and Linux versions alike.

The software updates for the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module address a vulnerability that could allow a remote, unauthenticated, attacker to force devices to reboot.

In order to be vulnerable to such an attack, the affected devices would have to run in transparent firewall mode, have IPv6 enabled and be configured to log message ID 110003, Cisco said in its corresponding advisory.

The Cisco Application Control Engine (ACE) security updates address a vulnerability that might cause an administrator to log into an unintended context (virtual instance), if an ACE appliance or module is running in multicontext mode and is configured with the same management IP address.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *