Cyber Posture

CVE-2025-20206

High

Published: 05 March 2025

Published
05 March 2025
Modified
22 July 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0003 7.1th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses.

Security Summary

CVE-2025-20206 is a vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows that enables a DLL hijacking attack. It affects devices where the Secure Firewall Posture Engine, formerly known as HostScan, is installed on Cisco Secure Client. The flaw arises from insufficient validation of resources loaded by the application at runtime.

An authenticated local attacker with valid user credentials on the Windows system can exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. Successful exploitation allows the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) and is associated with CWE-347.

The Cisco Security Advisory provides details on this issue, including mitigation recommendations, at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-dll-injection-AOyzEqSg.

Details

CWE(s)
CWE-347

Affected Products

cisco
secure client
≤ 5.1.8.105

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1574.001 DLL Stealth
Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses.
Why these techniques?

Vulnerability enables DLL hijacking via crafted IPC messages leading to arbitrary code execution with SYSTEM privileges, directly mapping to exploitation for privilege escalation (T1068) and DLL side-loading (T1574.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References