Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2012-3052


Untrusted search path vulnerability in Cisco VPN Client 5.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka Bug ID CSCua28747.


Published

2012-09-16T10:34:50.457

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.9 (MEDIUM)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.4

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco vpn_client 5.0 Yes
Application cisco vpn_client 5.0.01 Yes
Application cisco vpn_client 5.0.01.0600 Yes
Application cisco vpn_client 5.0.2 Yes
Application cisco vpn_client 5.0.02.0090 Yes
Application cisco vpn_client 5.0.2.0090 Yes
Application cisco vpn_client 5.0.03.0530 Yes
Application cisco vpn_client 5.0.03.0560 Yes
Application cisco vpn_client 5.0.04.0300 Yes
Application cisco vpn_client 5.0.5 Yes
Application cisco vpn_client 5.0.05.0290 Yes
Application cisco vpn_client 5.0.6 Yes
Application cisco vpn_client 5.0.06.0160 Yes
Application cisco vpn_client 5.0.7 Yes
Application cisco vpn_client 5.0.07.0290 Yes
Application cisco vpn_client 5.0.07.0410 Yes
Application cisco vpn_client 5.0.07.0440 Yes

References