Vulnerability Change Records for CVE-2024-20337
Change History
New CVE Received from Cisco Systems, Inc. 3/06/2024 12:15:09 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Description |
|
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
|
| Added |
CVSS V3.1 |
|
Cisco Systems, Inc. AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
|
| Added |
CWE |
|
Cisco Systems, Inc. CWE-93
|
| Added |
Reference |
|
Cisco Systems, Inc. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-client-crlf-W43V4G7 [No types assigned]
|
|