8.6
CVE-2023-20042
- EPSS 0.19%
- Veröffentlicht 01.11.2023 18:15:08
- Zuletzt bearbeitet 21.11.2024 07:40:25
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Firepower Threat Defense Version7.0.0
Cisco ≫ Firepower Threat Defense Version7.0.0.1
Cisco ≫ Firepower Threat Defense Version7.0.1
Cisco ≫ Firepower Threat Defense Version7.0.1.1
Cisco ≫ Firepower Threat Defense Version7.0.2
Cisco ≫ Firepower Threat Defense Version7.0.2.1
Cisco ≫ Firepower Threat Defense Version7.0.3
Cisco ≫ Firepower Threat Defense Version7.0.4
Cisco ≫ Firepower Threat Defense Version7.0.5
Cisco ≫ Firepower Threat Defense Version7.1.0
Cisco ≫ Firepower Threat Defense Version7.1.0.1
Cisco ≫ Firepower Threat Defense Version7.1.0.2
Cisco ≫ Firepower Threat Defense Version7.1.0.3
Cisco ≫ Firepower Threat Defense Version7.2.0
Cisco ≫ Firepower Threat Defense Version7.2.0.1
Cisco ≫ Firepower Threat Defense Version7.2.1
Cisco ≫ Firepower Threat Defense Version7.2.2
Cisco ≫ Firepower Threat Defense Version7.2.3
Cisco ≫ Firepower Threat Defense Version7.3.0
Cisco ≫ Firepower Threat Defense Version7.3.1
Cisco ≫ Firepower Threat Defense Version7.3.1.1
Cisco ≫ Adaptive Security Appliance Software Version9.16.1
Cisco ≫ Adaptive Security Appliance Software Version9.16.1.28
Cisco ≫ Adaptive Security Appliance Software Version9.16.2
Cisco ≫ Adaptive Security Appliance Software Version9.16.2.3
Cisco ≫ Adaptive Security Appliance Software Version9.16.2.7
Cisco ≫ Adaptive Security Appliance Software Version9.16.2.11
Cisco ≫ Adaptive Security Appliance Software Version9.16.2.13
Cisco ≫ Adaptive Security Appliance Software Version9.16.2.14
Cisco ≫ Adaptive Security Appliance Software Version9.16.3
Cisco ≫ Adaptive Security Appliance Software Version9.16.3.3
Cisco ≫ Adaptive Security Appliance Software Version9.16.3.14
Cisco ≫ Adaptive Security Appliance Software Version9.16.3.15
Cisco ≫ Adaptive Security Appliance Software Version9.16.3.19
Cisco ≫ Adaptive Security Appliance Software Version9.16.3.23
Cisco ≫ Adaptive Security Appliance Software Version9.16.4
Cisco ≫ Adaptive Security Appliance Software Version9.16.4.9
Cisco ≫ Adaptive Security Appliance Software Version9.17.1
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.7
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.9
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.10
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.11
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.13
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.15
Cisco ≫ Adaptive Security Appliance Software Version9.17.1.20
Cisco ≫ Adaptive Security Appliance Software Version9.18.1
Cisco ≫ Adaptive Security Appliance Software Version9.18.1.3
Cisco ≫ Adaptive Security Appliance Software Version9.18.2
Cisco ≫ Adaptive Security Appliance Software Version9.18.2.5
Cisco ≫ Adaptive Security Appliance Software Version9.18.2.7
Cisco ≫ Adaptive Security Appliance Software Version9.19.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.19% | 0.383 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
psirt@cisco.com | 6.8 | 2.2 | 4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-404 Improper Resource Shutdown or Release
The product does not release or incorrectly releases a resource before it is made available for re-use.