CVE-2007-1066
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/02/2007
Last modified:
09/04/2025
Description
Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client use an insecure default Discretionary Access Control Lists (DACL) for the connection client GUI, which allows local users to gain privileges by injecting "a thread under ConnectionClient.exe," aka CSCsg20558.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:secure_services_client:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:secure_services_client:4.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:secure_services_client:4.0.51:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:security_agent:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:security_agent:5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:trust_agent:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:trust_agent:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:trust_agent:2.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:trust_agent:2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:meetinghouse:aegis_secureconnect_client:windows_platform:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/33047
- http://secunia.com/advisories/24258
- http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml
- http://www.securityfocus.com/bid/22648
- http://www.securitytracker.com/id?1017683=
- http://www.securitytracker.com/id?1017684=
- http://www.vupen.com/english/advisories/2007/0690
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32625
- http://osvdb.org/33047
- http://secunia.com/advisories/24258
- http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml
- http://www.securityfocus.com/bid/22648
- http://www.securitytracker.com/id?1017683=
- http://www.securitytracker.com/id?1017684=
- http://www.vupen.com/english/advisories/2007/0690
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32625