Vulnerability Bulletins

Cisco Secure Client Carriage Return Line Feed Injection Vulnerability


System information

   
Affected software Cisco

Description

A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or

More info:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-client-crlf-W43V4G7?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Secure%20Client%20Carriage%20Return%20Line%20Feed%20Injection%20Vulnerability&vs_k=1

Standar resources

Property Value
CVE CVE-2024-20337.

Version history

Version Comments Date
Ministerio de Defensa
CNI
CCN
CCN-CERT