POC code for CVE-2020-3153 - Cisco anyconnect path traversal vulnerability# CVE-2020-3153
POC code for CVE-2020-3153 - Cisco anyconnect path traversal vulnerability
Read more about the vulnerability here: https://ssd-disclosure.com/ssd-advisory-cisco-anyconnect-privilege-elevation-through-path-traversal/
Steps to follow to get Windows shell on desktop with `SYSTEM` privilege:
1) In file `class1.cs`, Change the Username string to your user account directory in `CAC-nc-install` commandline parameter.
2) Create directory path "`Program Files (x86)/Cisco/Cisco AnyConnect Secure Mobility Client/Plugins/`" inside your userhome.
3) Copy actoast.dll on the above path.
## POC demo video
[](https://www.youtube.com/watch?v=7mjByDCeKBw)
Follow my work at: https://nixhacker.com
[4.0K] /data/pocs/407d749e3554758b41b374dcb9fd45cb0197f1bf
├── [ 68K] actoast.dll
├── [4.0K] CiscoAnyconnectExploit
│ ├── [4.0K] bin
│ │ └── [4.0K] Debug
│ │ └── [4.0K] netcoreapp3.1
│ │ ├── [8.0K] CiscoAnyconnectExploit.dll
│ │ └── [166K] CiscoAnyconnectExploit.exe
│ ├── [ 170] CiscoAnyconnectExploit.csproj
│ ├── [4.2K] Class1.cs
│ └── [4.0K] obj
│ ├── [2.0K] CiscoAnyconnectExploit.csproj.nuget.dgspec.json
│ ├── [1.1K] CiscoAnyconnectExploit.csproj.nuget.g.props
│ ├── [ 289] CiscoAnyconnectExploit.csproj.nuget.g.targets
│ ├── [1.9K] project.assets.json
│ └── [ 323] project.nuget.cache
├── [1.1K] CiscoAnyconnectExploit.sln
├── [ 34K] LICENSE
└── [ 788] README.md
5 directories, 13 files