CVE-2020-3153

Known Exploited Vulnerability Entry External Catalog

Entry Details

CVE-2020-3153

Confirmed

Yes

2022-10-24 00:00 UTC


Timestamps

2022-10-24

2022-10-24


Scope

KEV entry: Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability | Affected: Cisco / AnyConnect Secure | Description: Cisco AnyConnect Secure Mobility Client for Windows allows for incorrect handling of directory paths. An attacker with valid credentials on Windows would be able to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. | Required action: Apply updates per vendor instructions. | Due date: 2022-11-14 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-win-path-traverse-qO4HWBsj; https://nvd.nist.gov/vuln/detail/CVE-2020-3153


References
  • {'id': 'CVE-2020-3153', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3153'}

bc2bdfa0-ac56-4b2b-87f0-6b2346f577b9

405284c2-e461-4670-8979-7fd2c9755a60

2026-02-02 13:25 UTC

2026-02-06 07:53 UTC

Evidence (1)
Type Source Signal Confidence Details GCVE Metadata
vendor_report cisa-kev successful_exploitation 0.80
View details
{
  "cwes": [
    "CWE-427"
  ],
  "date_added": "2022-10-24",
  "due_date": "2022-11-14",
  "feed": "CISA Known Exploited Vulnerabilities Catalog",
  "knownRansomwareCampaignUse": "Known",
  "product": "AnyConnect Secure",
  "vendorProject": "Cisco",
  "vulnerabilityName": "Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability"
}
-