CVE-2021-1258 (CNNVD-202101-958)
中文标题:
Cisco Anyconnect Secure Mobility Client 权限许可和访问控制问题漏洞
英文标题:
Cisco AnyConnect Secure Mobility Client Arbitrary File Read Vulnerability
漏洞描述
中文描述:
Cisco Anyconnect Secure Mobility Client是美国思科(Cisco)公司的一款用于安全连接的VPN客户端软件。 Cisco AnyConnect Secure Mobility Client 存在安全漏洞,该漏洞允许身份验证的本地攻击者可利用该漏洞读取受影响设备的底层操作系统上的任意文件。
英文描述:
A vulnerability in the upgrade component of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker with low privileges to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the local CLI to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying OS of the affected device. The attacker would need to have valid user credentials to exploit this vulnerability.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco AnyConnect Secure Mobility Client | n/a | - | - |
cpe:2.3:a:cisco:cisco_anyconnect_secure_mobility_client:n_a:*:*:*:*:*:*:*
|
| cisco | anyconnect_secure_mobility_client | * | - | - |
cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:linux_kernel:*:*
|
| mcafee | agent_epolicy_orchestrator_extension | * | - | - |
cpe:2.3:a:mcafee:agent_epolicy_orchestrator_extension:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-1258 |
2025-11-11 15:20:45 | 2025-11-11 07:36:33 |
| NVD | nvd_CVE-2021-1258 |
2025-11-11 14:57:33 | 2025-11-11 07:44:55 |
| CNNVD | cnnvd_CNNVD-202101-958 |
2025-11-11 15:10:34 | 2025-11-11 07:56:36 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 权限许可和访问控制问题
- cnnvd_id: 未提取 -> CNNVD-202101-958
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 3
- data_sources: ['cve'] -> ['cve', 'nvd']