Cisco Trust Agent Vulnerability

Credit: adblake
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-287

CVSS Base Score: 7.2/10
Impact Subscore: 10/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

Vulnerability: There is a vulnerability affecting the latest version (v2.1.103.0) of the Cisco Trust Agent software for MacOS X that can allow an individual with physical access to an endpoint to bypass authentication and gain administrative access to the local machine. Description: When Cisco Secure Access Control Server is configured to display a message to the end user following a posture check, the Cisco Trust Agent installed on a MacOS X machine may display the message over the top of the login screen when the client is powered up or rebooted. When the message is displayed, a user can access System Preferences through the Apple Menu as the root user and make changes to user accounts, including changing existing passwords. A malicious user with this access can change an administrator account password without knowledge of the existing password and then proceed to login using that account. Adam Blake of Deloitte UK (

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024,


Back to Top