CVE-2023-20042
CVSS V2 None
CVSS V3 None
Description
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.
Overview
- CVE ID
- CVE-2023-20042
- Assigner
- cisco
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-11-01T17:11:08.109Z
- Last Modified Date
- 2024-01-25T16:57:36.733Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssl-dos-kxG8mpUA |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-20042 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20042 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 07:43:25 | Added to TrackCVE |