Cisco AnyConnect CVE-2020–3153

Md. Mahim Bin Firoj
3 min readJun 26, 2023

--

Its a local privilege escalation vulnerability. If your cisco AnyConnect version is < 4.8.02042, then you are vulnerable to this privilege escalation through path traversal attack.

The vulnerability is a bit old but still effective. My tested AnyConnect version is 4.6.03049

Please note: The walkthrough is made to aware the community for patching the vulnerable anyconnect software as soon as possible because i have seen in many organizations still using vulnerable anyconnect software. Please don’t use it for malicious purpose.

Pic 1

As we can see there is no other user present in the Local Administrators group.

Pic 2

You can download the poc from the above link.

Pic 3

Just execute the POC from powershell. You will get a privileged shell. Enter command cd\ there.

Pic 4

You are now nt authority\system. Now you can do anything on the system.

Pic 5

You are taking your username to the local administrator group.

Alternate way:

Say you can not execute unknown .exe because of application whitelisting configured in place. In that case the following method will help you.

Pic 6

First you need to go to this folder. C:\Windows\Microsoft.Net\Framework64\v4.0.30319

There you will get MSBuild.exe

Now you need to point your CVE-2020–3153.xml file which you have already downloaded from github.

PS C:\Windows\Microsoft.Net\Framework64\v4.0.30319> .\MSBuild.exe C:\Users\Avi_Mahim\Downloads\CVE-2020–3153-master\CVE-
2020–3153-master\msbuild\CVE-2020–3153.xml

After execution you will get the shell with high privileges.

Pic 7

Notice Pic 5 now. As you can see the user is in the local administrators group now.

In this anyconnect version, I have also tested the latest cisco anyconnect vulnerability CVE-2023–20178 but i found its not working in this particular version.

Thanks hope you like it. Please subscribe below.

LinkedIn:

https://www.linkedin.com/in/md-mahimbin-firoj-7b8a5a113/

YouTube:

https://www.youtube.com/@mahimfiroj1802/videos

--

--

No responses yet