8.6
CVE-2022-20715
- EPSS 1.45%
- Veröffentlicht 03.05.2022 04:15:09
- Zuletzt bearbeitet 21.11.2024 06:43:23
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the remote access SSL VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper validation of errors that are logged as a result of client connections that are made using remote access VPN. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Firepower Threat Defense Version < 6.4.0.15
Cisco ≫ Firepower Threat Defense Version >= 6.5.0 < 6.6.5.2
Cisco ≫ Firepower Threat Defense Version >= 6.7.0 < 7.0.2
Cisco ≫ Firepower Threat Defense Version7.1.0
Cisco ≫ Adaptive Security Appliance Software Version < 9.8.4.44
Cisco ≫ Adaptive Security Appliance Software Version >= 9.9 < 9.12.4.38
Cisco ≫ Adaptive Security Appliance Software Version >= 9.13 < 9.14.4
Cisco ≫ Adaptive Security Appliance Software Version >= 9.15 < 9.15.1.21
Cisco ≫ Adaptive Security Appliance Software Version >= 9.16.0 < 9.16.2.14
Cisco ≫ Adaptive Security Appliance Software Version >= 9.17.0 < 9.17.1.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.45% | 0.799 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
psirt@cisco.com | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.