
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-34788 is a vulnerability discovered in the shared library loading mechanism of Cisco AnyConnect Secure Mobility Client for Linux and Mac OS, specifically affecting systems with the VPN Posture (HostScan) Module installed. The vulnerability was disclosed on October 6, 2021, and affects versions earlier than 4.10.03104 (Cisco Advisory).
The vulnerability stems from a race condition in the signature verification process for shared library files that are loaded on affected devices. It has been assigned a CVSS base score of 7.0 (High) with the following vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X. The vulnerability is tracked under CWE-367 (Cisco Advisory).
A successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected device with root privileges. This level of access provides complete control over the affected system, potentially compromising the entire security posture of the device (Cisco Advisory).
Cisco has released software updates that address this vulnerability in version 4.10.03104 and later. There are no workarounds available for this vulnerability, making it critical for affected users to upgrade to a patched version. The vulnerability does not affect AnyConnect Secure Mobility Client for Windows or mobile device operating systems (Cisco Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."