This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2006-10-18
Product Secure Desktop Last view 2015-04-16
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:cisco:secure_desktop:*:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:secure_desktop:3.1.1:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:secure_desktop:3.1.1.27:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:secure_desktop:3.1_base:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:secure_desktop:3.1.0.31:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:secure_desktop:3.0_base:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:secure_desktop:3.1:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:secure_desktop:3.1.1.33:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:secure_desktop:3.4.2048:*:*:*:*:*:*:* 5
cpe:2.3:a:cisco:secure_desktop:3.1.1.45:*:*:*:*:*:*:* 5
cpe:2.3:a:cisco:secure_desktop:3.4.2:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.2.1.126:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.3.0.151:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.2:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.2_base:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.5_base:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.4.1108:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.4:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.2.0.136:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.4.1:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.2.1.103:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.4_base:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.3_base:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.3.0.118:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.4.0373:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.3:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.2.1:*:*:*:*:*:*:* 4
cpe:2.3:a:cisco:secure_desktop:3.5.2008:*:*:*:*:*:*:* 3
cpe:2.3:a:cisco:secure_desktop:3.5.1077:*:*:*:*:*:*:* 3
cpe:2.3:a:cisco:secure_desktop:3.5:*:*:*:*:*:*:* 3
cpe:2.3:a:cisco:secure_desktop:3.5.841:*:*:*:*:*:*:* 3
cpe:2.3:a:cisco:secure_desktop:3.5.2001:*:*:*:*:*:*:* 3
cpe:2.3:a:cisco:secure_desktop:3.5.2003:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:secure_desktop:3.6.2002:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:secure_desktop:3.6.5005:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:secure_desktop:3.6.1001:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:secure_desktop:3.6.4021:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:secure_desktop:3.6.185:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:secure_desktop:3.6.181:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:secure_desktop:3.6.3002:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:secure_desktop:3.6.6104:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:secure_desktop:3.6.6203:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:secure_desktop:3.6.6210:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:secure_desktop:3.6.6249:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:secure_desktop:3.6.6020:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:secure_desktop:3.6.6228:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:secure_desktop:3.6_base:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:secure_desktop:3.6:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:secure_desktop:3.6.6234:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
9.3 2015-04-16 CVE-2015-0691

A certain Cisco JAR file, as distributed in Cache Cleaner in Cisco Secure Desktop (CSD), allows remote attackers to execute arbitrary commands via a crafted web site, aka Bug ID CSCup83001.

9.3 2012-09-24 CVE-2012-4655

The WebLaunch feature in Cisco Secure Desktop before 3.6.6020 does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug IDs CSCtz76128 and CSCtz78204.

4.3 2012-06-20 CVE-2012-2495

The HostScan downloader implementation in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR8 and Cisco Secure Desktop before 3.6.6020 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtx74235.

9.3 2011-02-28 CVE-2011-0925

The CSDWebInstallerCtrl ActiveX control in CSDWebInstaller.ocx in Cisco Secure Desktop (CSD) allows remote attackers to download an unintended Cisco program onto a client machine, and execute this program, by identifying a Cisco program with a Cisco digital signature and then renaming this program to inst.exe, a different vulnerability than CVE-2010-0589 and CVE-2011-0926.

9.3 2011-02-25 CVE-2011-0926

A certain ActiveX control in CSDWebInstaller.ocx in Cisco Secure Desktop (CSD) does not properly verify the signature of an unspecified downloaded program, which allows remote attackers to execute arbitrary code by spoofing the CSD installation process, a different vulnerability than CVE-2010-0589.

2.1 2010-10-14 CVE-2009-5008

Cisco Secure Desktop (CSD), when used in conjunction with an AnyConnect SSL VPN server, does not properly perform verification, which allows local users to bypass intended policy restrictions via a modified executable file.

9.3 2010-04-15 CVE-2010-0589

The Web Install ActiveX control (CSDWebInstaller) in Cisco Secure Desktop (CSD) before 3.5.841 does not properly verify the signatures of downloaded programs, which allows remote attackers to force the download and execution of arbitrary files via a crafted web page, aka Bug ID CSCta25876.

4.3 2010-02-03 CVE-2010-0440

Cross-site scripting (XSS) vulnerability in +CSCOT+/translation in Cisco Secure Desktop 3.4.2048, and other versions before 3.5; as used in Cisco ASA appliance before 8.2(1), 8.1(2.7), and 8.0(5); allows remote attackers to inject arbitrary web script or HTML via a crafted POST parameter, which is not properly handled by an eval statement in binary/mainv.js that writes to start.html.

4.6 2006-11-08 CVE-2006-5808

The installation of Cisco Secure Desktop (CSD) before 3.1.1.45 uses insecure default permissions (all users full control) for the CSD directory and its parent directory, which allow local users to gain privileges by replacing CSD executables, aka "Local Privilege Escalation".

4.6 2006-11-08 CVE-2006-5807

Cisco Secure Desktop (CSD) before 3.1.1.45 allows local users to escape out of the secure desktop environment by using certain applications that switch to the default desktop, aka "System Policy Evasion".

2.1 2006-11-08 CVE-2006-5806

SSL VPN Client in Cisco Secure Desktop before 3.1.1.45, when configured to spawn a web browser after a successful connection, stores sensitive browser session information in a directory outside of the CSD vault and does not restrict the user from saving files outside of the vault, which is not cleared after the VPN connection terminates and allows local users to read unencrypted data.

2.1 2006-10-18 CVE-2006-5394

The default configuration of Cisco Secure Desktop (CSD) has an unchecked "Disable printing" box in Secure Desktop Settings, which might allow local users to read data that was sent to a printer during another user's SSL VPN session.

2.1 2006-10-18 CVE-2006-5393

Cisco Secure Desktop (CSD) does not require that the ClearPageFileAtShutdown (aka CCE-Winv2.0-407) registry value equals 1, which might allow local users to read certain memory pages that were written during another user's SSL VPN session.

CWE : Common Weakness Enumeration

%idName
55% (5) CWE-20 Improper Input Validation
22% (2) CWE-264 Permissions, Privileges, and Access Controls
11% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
11% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...

SAINT Exploits

Description Link
Cisco Secure Desktop CSDWebInstaller code exec More info here

Open Source Vulnerability Database (OSVDB)

id Description
73338 Cisco Secure Desktop (CSD) CSDWebInstaller.ocx ActiveX inst.exe Program Name ...
73337 Cisco Secure Desktop (CSD) CSDWebInstaller.ocx ActiveX Installation Process S...
68633 Cisco Secure Desktop (CSD) Crafted Executable Local Policy Restriction Bypass
63809 Cisco Secure Desktop (CSD) CSDWebInstaller ActiveX Signature Verification Arb...
62069 Cisco Secure Desktop (CSD) /translation POST Request XSS
33065 Cisco Secure Desktop SSL VPN Local Memory Disclosure
32406 Cisco Secure Desktop Cross VPN Session Information Disclosure
30308 Cisco Secure Desktop (CSD) Installation Permission Weakness Local Privilege E...
30307 Cisco Secure Desktop (CSD) Unspecified System Policy Evasion
30306 Cisco Secure Desktop (CSD) SSL VPN Client Browser Session Information Local D...

OpenVAS Exploits

id Description
2012-09-12 Name : Cisco Products ActiveX Control Multiple Vulnerabilities
File : nvt/gb_cisco_prdts_activex_mult_vuln.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2012-A-0104 Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client
Severity: Category I - VMSKEY: V0033046

Snort® IPS/IDS

Date Description
2015-04-22 Cisco Secure Desktop Applet command execution attempt
RuleID : 34180 - Type : OS-OTHER - Revision : 1
2014-01-10 Cisco Secure Desktop CSDWebInstaller ActiveX function call access
RuleID : 24282 - Type : BROWSER-PLUGINS - Revision : 5
2014-01-10 Cisco Secure Desktop CSDWebInstaller ActiveX clsid access
RuleID : 24281 - Type : BROWSER-PLUGINS - Revision : 8

Nessus® Vulnerability Scanner

id Description
2012-09-11 Name: The remote Windows host is missing an update that disables selected ActiveX c...
File: smb_kb_2736233.nasl - Type: ACT_GATHER_INFO
2012-07-02 Name: The remote host has software installed that is affected by multiple vulnerabi...
File: cisco_anyconnect_vpn_hostscan_downgrade.nasl - Type: ACT_GATHER_INFO
2012-07-02 Name: The remote host has software installed that is affected by multiple vulnerabi...
File: macosx_cisco_anyconnect_multiple.nasl - Type: ACT_GATHER_INFO