{"uuid": "7ea4df64-82b7-4bf1-b80d-043a7e10ff64", "vulnerability": {"vulnId": "CVE-2020-3433", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "7ea4df64-82b7-4bf1-b80d-043a7e10ff64"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2022-10-24T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2022-10-24T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2022-10-24T00:00:00Z"}, "scope": {"notes": "KEV entry: Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability | Affected: Cisco / AnyConnect Secure | Description: Cisco AnyConnect Secure Mobility Client for Windows interprocess communication (IPC) channel allows for insufficient validation of resources that are loaded by the application at run time. An attacker with valid credentials on Windows could execute code on the affected machine with SYSTEM privileges. | Required action: Apply updates per vendor instructions. | Due date: 2022-11-14 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW; https://nvd.nist.gov/vuln/detail/CVE-2020-3433"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-427"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "AnyConnect Secure", "due_date": "2022-11-14", "date_added": "2022-10-24", "vendorProject": "Cisco", "vulnerabilityName": "Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2020-3433", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3433"}]}
