{"metadata": {"count": 1, "page": 1, "per_page": 100}, "data": [{"uuid": "bc2bdfa0-ac56-4b2b-87f0-6b2346f577b9", "vulnerability": {"vulnId": "CVE-2020-3153", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "bc2bdfa0-ac56-4b2b-87f0-6b2346f577b9"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2022-10-24T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2022-10-24T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2022-10-24T00:00:00Z"}, "scope": {"notes": "KEV entry: Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability | Affected: Cisco / AnyConnect Secure | Description: Cisco AnyConnect Secure Mobility Client for Windows allows for incorrect handling of directory paths. An attacker with valid credentials on Windows would be able to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. | Required action: Apply updates per vendor instructions. | Due date: 2022-11-14 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-win-path-traverse-qO4HWBsj; https://nvd.nist.gov/vuln/detail/CVE-2020-3153"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-427"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "AnyConnect Secure", "due_date": "2022-11-14", "date_added": "2022-10-24", "vendorProject": "Cisco", "vulnerabilityName": "Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2020-3153", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3153"}]}]}
