![]() ![]() An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. ![]() This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the upgrade process. The flaw allows attackers to potentially escalate privileges to the SYSTEM account.Ī vulnerability in the client update feature of Cisco An圜onnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. Cisco Secure Client is the fresh recipient of a fix to address a high-severity vulnerability related to improper permissions. ![]()
0 Comments
Leave a Reply. |