Unknown
CVE-2023-20042
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-20042
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- adaptive security appliance software 9.16.1,
- adaptive security appliance software 9.16.1.28,
- adaptive security appliance software 9.16.2,
- adaptive security appliance software 9.16.2.11,
- adaptive security appliance software 9.16.2.13,
- adaptive security appliance software 9.16.2.14,
- adaptive security appliance software 9.16.2.3,
- adaptive security appliance software 9.16.2.7,
- adaptive security appliance software 9.16.3,
- adaptive security appliance software 9.16.3.14,
- adaptive security appliance software 9.16.3.15,
- adaptive security appliance software 9.16.3.19,
- adaptive security appliance software 9.16.3.23,
- adaptive security appliance software 9.16.3.3,
- adaptive security appliance software 9.16.4,
- adaptive security appliance software 9.16.4.9,
- adaptive security appliance software 9.17.1,
- adaptive security appliance software 9.17.1.10,
- adaptive security appliance software 9.17.1.11,
- adaptive security appliance software 9.17.1.13,
- adaptive security appliance software 9.17.1.15,
- adaptive security appliance software 9.17.1.20,
- adaptive security appliance software 9.17.1.7,
- adaptive security appliance software 9.17.1.9,
- adaptive security appliance software 9.18.1,
- adaptive security appliance software 9.18.1.3,
- adaptive security appliance software 9.18.2,
- adaptive security appliance software 9.18.2.5,
- adaptive security appliance software 9.18.2.7,
- adaptive security appliance software 9.19.1,
- firepower threat defense 7.0.0,
- firepower threat defense 7.0.0.1,
- firepower threat defense 7.0.1,
- firepower threat defense 7.0.1.1,
- firepower threat defense 7.0.2,
- firepower threat defense 7.0.2.1,
- firepower threat defense 7.0.3,
- firepower threat defense 7.0.4,
- firepower threat defense 7.0.5,
- firepower threat defense 7.1.0,
- firepower threat defense 7.1.0.1,
- firepower threat defense 7.1.0.2,
- firepower threat defense 7.1.0.3,
- firepower threat defense 7.2.0,
- firepower threat defense 7.2.0.1,
- firepower threat defense 7.2.1,
- firepower threat defense 7.2.2,
- firepower threat defense 7.2.3,
- firepower threat defense 7.3.0,
- firepower threat defense 7.3.1,
- firepower threat defense 7.3.1.1
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: