Cisco fixes high-severity vulnerabilities in its VPN product


Cisco has announced patches for two critical vulnerabilities in Secure Client, an enterprise VPN application that also includes security and monitoring features.

The first vulnerability, identified as CVE-2024-20337, affects Secure Client versions for Linux, macOS, and Windows and can be exploited remotely, without authentication, in carriage return line feed (CRLF) injection attacks. Because user-supplied input is not sufficiently validated, an attacker who tricked a user into clicking a crafted link while establishing a VPN session could run arbitrary scripts in the victim’s browser or gain access to sensitive information, such as SAML tokens.

According to Cisco, only Secure Client instances with the SAML External Browser feature enabled on the VPN headend are vulnerable.

Read More: Cisco Patches High-Severity Vulnerabilities in VPN Product

Check Out The New ITsecuritywire Podcast. For more such updates follow us on Google News ITsecuritywire News.