8.6

CVE-2022-20715

A vulnerability in the remote access SSL VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper validation of errors that are logged as a result of client connections that are made using remote access VPN. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoFirepower Threat Defense Version < 6.4.0.15
CiscoFirepower Threat Defense Version >= 6.5.0 < 6.6.5.2
CiscoFirepower Threat Defense Version >= 6.7.0 < 7.0.2
CiscoFirepower Threat Defense Version7.1.0
CiscoAdaptive Security Appliance Software Version >= 9.9 < 9.12.4.38
CiscoAdaptive Security Appliance Software Version >= 9.13 < 9.14.4
CiscoAdaptive Security Appliance Software Version >= 9.15 < 9.15.1.21
CiscoAdaptive Security Appliance Software Version >= 9.16.0 < 9.16.2.14
CiscoAdaptive Security Appliance Software Version >= 9.17.0 < 9.17.1.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.45% 0.799
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
psirt@cisco.com 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.