Cisco Releases Security Advisory for Secure Client
CVE-2025-20206 could allow an attacker to execute arbitrary code with system privileges
Summary
CVE-2025-20206 could allow an attacker to execute arbitrary code with system privileges
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Cisco has released a security advisory to address a vulnerability in its Secure Client for Windows. Secure Client is Cisco's endpoint virtual private network (VPN) solution.
- CVE-2025-20206 has a CVSSv3 score of 7.1 and if exploited could allow an authenticated, local attacker to achieve arbitrary code execution (ACE) on the affected machine with SYSTEM privileges via DLL hijacking.
The vulnerability only affects the Windows version of Secure Client, and only affects Secure Clients with the Secure Firewall Posture Engine module installed.
Remediation advice
Affected organisations are encouraged to review Cisco Security Advisory cisco-sa-secure-dll-injection-AOyzEqSg and apply the relevant updates as soon as practicable.
Definitive source of threat updates
Last edited: 6 March 2025 2:11 pm