Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to compromise a user’s system, according to Secunia.
1. An error in the graphical user interface when displayed on the Windows logon screen can be exploited to perform certain actions with the privileges of the LocalSystem account.
Successful exploitation of this vulnerability requires the Start Before Logon (SBL) feature to be enabled.
2. An error in the helper application used for remote deployment of the client (e.g. “Cisco.AnyConnect.VPNWeb.1” ActiveX control) due to insufficient authenticity validation of downloaded executables can be exploited to download and execute an arbitrary program.
Cisco has released free software updates that address these vulnerabilities, there are no workarounds.