Unknown
CVE-2022-20933
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-20933
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- meraki mx100 firmware,
- meraki mx105 firmware,
- meraki mx250 firmware,
- meraki mx400 firmware,
- meraki mx450 firmware,
- meraki mx600 firmware,
- meraki mx64 firmware,
- meraki mx64w firmware,
- meraki mx65 firmware,
- meraki mx65w firmware,
- meraki mx67 firmware,
- meraki mx67cw firmware,
- meraki mx67w firmware,
- meraki mx68 firmware,
- meraki mx68cw firmware,
- meraki mx68w firmware,
- meraki mx75 firmware,
- meraki mx84 firmware,
- meraki mx85 firmware,
- meraki mx95 firmware,
- meraki vmx firmware,
- meraki z3 firmware -,
- meraki z3c firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: