A vulnerability in the ISE Posture (System Scan) module of Cisco Secure Client for Linux could allow an authenticated, local attacker to elevate privileges on an affected device.
 This vulnerability is due to the use of an uncontrolled search path element. An attacker could exploit this vulnerability by copying a malicious library file to a specific directory in the filesystem and persuading an administrator to restart a specific process. A successful exploit could allow the attacker to execute arbitrary code on an affected device with root privileges.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 22 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Cisco Cisco secure Client Linux Linux linux Kernel | |
| CPEs | cpe:2.3:a:cisco:secure_client:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
| Vendors & Products | Cisco Cisco secure Client Linux Linux linux Kernel | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: cisco
Published: 2024-03-06T16:29:33.440Z
Updated: 2024-08-01T21:59:42.263Z
Reserved: 2023-11-08T15:08:07.642Z
Link: CVE-2024-20338
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T21:59:42.263Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-03-06T17:15:09.783
Modified: 2025-07-22T18:04:59.510
Link: CVE-2024-20338
 Redhat
                        Redhat
                    No data.