CVE-2024-20391
Cisco AnyConnect Secure Client vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2024-20391) was discovered in the Network Access Manager (NAM) module of Cisco Secure Client for Windows. The vulnerability was disclosed on May 15, 2024, and affects devices running vulnerable releases of Cisco Secure Client for Windows with the NAM module installed. This security flaw allows an unauthenticated attacker with physical access to an affected device to elevate privileges to SYSTEM level (Cisco Advisory).

Technical details

The vulnerability stems from a lack of authentication on a specific function in the NAM module. It has been assigned CWE-306 (Missing Authentication for Critical Function) and received a CVSS v3.1 base score of 6.8 (Medium) with the vector string CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The scoring indicates that while physical access is required, the attack complexity is low and no privileges or user interaction are needed (Cisco Advisory, NVD).

Impact

A successful exploitation of this vulnerability allows an attacker to execute arbitrary code with SYSTEM privileges on an affected device, potentially gaining complete control over the system (Cisco Advisory).

Mitigation and workarounds

Cisco has released software updates to address this vulnerability in version 5.1.3.62. No workarounds are available for this vulnerability. The fix is available for all affected systems running versions earlier than 5.1.3.62. The vulnerability does not affect Secure Client for Linux, macOS, or mobile device operating systems (Cisco Advisory).

Community reactions

The vulnerability was responsibly disclosed by security researchers Julien Egloff and Kevin Tellier from Synacktiv (Cisco Advisory).

Additional resources


SourceThis report was generated using AI

Related Cisco AnyConnect Secure Client vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20206HIGH7.8
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:secure_client
NoYesMar 05, 2025
CVE-2024-3661HIGH7.6
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • NetworkManager-adsl
NoYesMay 06, 2024
CVE-2024-20391MEDIUM6.8
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:secure_client
NoYesMay 15, 2024
CVE-2024-20474MEDIUM6.5
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:anyconnect_secure_mobility_client
NoYesOct 23, 2024
CVE-2020-3432MEDIUM5.6
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:anyconnect_secure_mobility_client
NoYesFeb 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management