Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
Use CWE-378, Cisco vendor hub and Anyconnect Secure Mobility Client product page to widen CVE-2021-1496 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-20178, CVE-2021-34788 and CVE-2021-1567 for nearby disclosures in the same product family. Additional editorial context is available in The Weekly Cybersecurity Brief: January 30th, 2026.