CVE-2025-20206

Published Mar 5, 2025

Last updated 7 months ago

Overview

Description
A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system.
Source
psirt@cisco.com
NVD status
Analyzed
Products
secure_client

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

psirt@cisco.com
CWE-347

Social media

Hype score
Not currently trending
  1. Cisco Secure Client Vulnerability (CVE-2025-20206) A critical DLL hijacking flaw in Cisco Secure Client for Windows allows local privilege escalation to SYSTEM. #Cisco #CVE #CyberSecurity #ThreatAlert ๐Ÿ”— Full details https://t.co/U39x5Mfjk3 https://t.co/h4r6Jg00Yf

    @threatsbank

    7 Mar 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Cisco has alerted users to a critical vulnerability (CVE-2025-20206) in Cisco Secure Client for Windows, allowing code execution with SYSTEM privileges. Update to version 5.1.8.105 or later. ๐Ÿ‡บ๐Ÿ‡ธ #CiscoClient #WindowsSecurity link: https://t.co/ayvzo1wwfc https://t.co/BJJZm94vmN

    @TweetThreatNews

    7 Mar 2025

    45 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. ๐Ÿšจ CVE-2025-20206 ๐Ÿ”ด HIGH (7.1) ๐Ÿข Cisco - Cisco Secure Client ๐Ÿ—๏ธ 4.9.00086 ๐Ÿ”— https://t.co/Lak5fDjA9F #CyberCron #VulnAlert #InfoSec https://t.co/hP1BpcdcWe

    @cybercronai

    7 Mar 2025

    113 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    1 Quote

  4. Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL Hijacking Vulnerability (CVE-2025-20206) #Cisco #CiscoSecureClient #CVE202520206 #DLLHijackingVulnerability https://t.co/kgzLCj89GF https://t.co/HY6g47rRdV

    @SystemTek_UK

    6 Mar 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. ๏ฟฝ๏ฟฝ CVE-2025-20206 - Cisco Secure Client - HIGH ๐Ÿšจ ๐Ÿ—“๏ธ Date published 2025-03-05 17:15:14 UTC #CiscoSecureClient #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/I9ATYnazln

    @vulns_space

    5 Mar 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. ๐Ÿšจ CVE-2025-20206 ๐Ÿ”ด HIGH (7.1) ๐Ÿข Cisco - Cisco Secure Client ๐Ÿ—๏ธ 4.9.00086 ๐Ÿ”— https://t.co/Lak5fDjA9F #CyberCron #VulnAlert #InfoSec @Cisco https://t.co/fFR9ICVLii

    @cybercronai

    5 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations