Cisco Anyconnect Secure Mobility Client Version 5

0 views
Skip to first unread message

Inacayal Tanoesoedibjo

unread,
Aug 3, 2024, 11:10:02 AM8/3/24
to tefcingdodfumb

A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established.

This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.

Cisco has released free software updates that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.

Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:
-user-license-agreement.html

Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.

The Cisco Support and Downloads page on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.

When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page, to determine exposure and a complete upgrade solution.

In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.

Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: -cisco-worldwide-contacts.html

In the following tables, the left column lists Cisco software releases. The right column indicates whether a release is affected by the vulnerability that is described in this advisory and the first release that includes the fix for this vulnerability. Customers are advised to upgrade to an appropriate fixed software release as indicated in this section.

To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.

Faced that issue with one of our employees, i remember first checking the anyconnect logs, then trying to use anyconnect 3.0 disabling Internet connection sharing through services.msc which sort of fixed it. And then setting the MTU of the network adapter at higher than what it was, i guess the last step ffixed it.

We connect to 2 different sites with anyconnect, but those 2 locations have a site-site VPN tunnel between them. Regardless, for some reason what worked for me to resolve this problem was to connect to site A using the older version of the anyconnect client. Then disconnect, and connect to site B, which automatically updated the client version upon connect. For whatever reason, that worked.

As khan1324 mentions - changing the MTU on the ASA may help your situation. We actually have two groups for people to choose from when they connect using the Anyconnect client. One uses the default MTU of 1500 bytes and another use an MTU of 1200. These are settings configured within the Group Policy.

I had permission to install "AnyConnect-MacOsX-3.1.05152-web-deploy-k9.dmg" from Boise State University. I installed cisco's any connect and I was able to connect to Boise State (It was working). My son deleted the application/program by accident. He dragged the cisco folder to trash can and deleted.

But I can no longer see it or have access to this program in my computer. I have used "Finder" to look for cisco and anyconnect and nothing comes up. I have searched in my hard drive and again and don't see the Cisco Anyconnect. I just don't know why my computer keeps telling me that it is already installed.

I tried your suggestion but it din't work. I kept getting the "No such file or directory" error in the iMac Terminal. I even tried a few combinations of your suggestions and I kept getting the same error.

You are doing it correct...basically the output shows that no such file exists on your system...also the directory is missing and you are saying that the application is also removed from the "Application" folder...so IMO the application is gone so you should be able to re-install. However, you aren't able to re-install so there is still something left that is preventing you from doing it...unfortunately, I am out of ideas at this point :(

Otherwise, you can maybe try contacting Apple support or take the Mac to an Apple store and have the guys there take a look. Last but not the least, you could try some third party app remover like AppCleaner and see if that can help you out.

My problem got finally fixed. An agent from MacKeeper helped. Of course I had to pay $169, but he was able to fix via remote, but they also gave me one year of their mackeeper software for free. I didn't call Apple because I figure they would charge as well.

I've had to work to uninstall the client as well so I can reinstall it. But being the SysAdmin I was I manually deleted everything.... Still wouldn't reinstall saying that it was installed. Then I remembered that OSX moved it's install package receipts from a flat file location to more of a DB store.

Keep getting this message when trying to re-install Cisco VPN - "anyconnect secure mobility client cannot be installed on this disk. Version 3.1.02026 of the cisco anyconnect secure mobility client is already installed." Moved and deleted and when I search I only find the download or emails with information on the subject.

Whenever you remove system modifications, they must be removed completely, and the only way to do that is to use the uninstallation tool, if any, provided by the developers, or to follow their instructions. If the software has been incompletely removed, you may have to re-download or even reinstall it in order to finish the job.

Tried again with reboots (same way I did before) and it worked loading the web based one. Talked with our VPN guru here also (has a MAC at home) and went through the process with him and he did the same thing I did. Well, it worked for him.

Now, with Secure Client, you gain improved secure remote access, a suite of modular security services, and a path for enabling Zero Trust Network Access (ZTNA) across the distributed network. The newest capability is in Secure Endpoint as a new module within the unified endpoint agent framework. Now you can harness Endpoint Detection & Response (EDR) from within Secure Client. You no longer need to deploy and manage Secure Client and Secure Endpoint as separate agents, making management more effortless on the backend.

Within Device Insights, Secure Client lets you deploy, update, and manage your agents from a new cloud management system inside SecureX. If you choose to use cloud management, Secure Client policy and deployment configuration are done in the Insights section of Cisco SecureX. Powerful visibility capabilities in SecureX Device Insights show which endpoints have Secure Client installed in addition to what module versions and profiles they are using.

The emphasis on interoperability of endpoint security agents helps provide the much-needed visibility and simplification across multiple Cisco security solutions while simultaneously reducing the complexity of managing multiple endpoints and agents. Application and data visibility is one of the top ways Secure Client can be an important part of an effective security resilience strategy.

We are not sure what specific issue you are referring to. The last round of issues were resolved by a macOS update and we also put in a workaround from our side. Please reach out to ac-mobile...@cisco.com if you need help with something still not functioning properly with current Secure Client and macOS versions.

I like that the Secure Clients are converging, but multiple UI versions, 4.1 for AnyConnect and 5.0 for SecureEndpoint are not working together well for the user. I can find no supporting information on this.

c80f0f1006
Reply all
Reply to author
Forward
0 new messages