CVE-2021-1426
Cisco AnyConnect Secure Client vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2021-1426) was discovered in the uninstall process of Cisco AnyConnect Secure Mobility Client for Windows. The vulnerability was first published on May 5, 2021, and affects versions earlier than 4.9.06037. This security flaw exists because a temporary file with insecure permissions is created during the uninstall process (Cisco Advisory).

Technical details

The vulnerability is characterized by insecure file permissions during the uninstall process, which allows for executable hijacking attacks. It has been assigned a CVSS Base Score of 7.0 (High) with the vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability is tracked under Cisco Bug IDs CSCvv43102 and CSCvv60844 (Cisco Advisory).

Impact

A successful exploitation of this vulnerability allows an authenticated, local attacker to execute arbitrary code on the affected device with SYSTEM privileges. This means an attacker could gain complete control over the system, potentially leading to unauthorized access, data theft, or system compromise (Cisco Advisory).

Mitigation and workarounds

Cisco has released software updates that address this vulnerability in version 4.9.06037. There are no workarounds available for this vulnerability. Users are advised to upgrade to the fixed version. The software can be downloaded from the Cisco Software Center by navigating to Security > VPN and Endpoint Security Clients > Cisco VPN Clients > AnyConnect Secure Mobility Client > AnyConnect Secure Mobility Client v4.x (Cisco Advisory).

Community reactions

The vulnerability was discovered and reported by Can Huang and Xinhui Han at Wangxuan Institute of Computer Technology, Peking University, and Lasse Trolle Borup of Danish Cyber Defence (Cisco Advisory).

Additional resources


SourceThis report was generated using AI

Related Cisco AnyConnect Secure Client vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20206HIGH7.8
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:secure_client
NoYesMar 05, 2025
CVE-2024-3661HIGH7.6
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • NetworkManager-ovs-debuginfo
NoYesMay 06, 2024
CVE-2024-20391MEDIUM6.8
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:secure_client
NoYesMay 15, 2024
CVE-2024-20474MEDIUM6.5
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:anyconnect_secure_mobility_client
NoYesOct 23, 2024
CVE-2020-3432MEDIUM5.6
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:anyconnect_secure_mobility_client
NoYesFeb 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management