CVE-2023-20042
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/11/2023
Last modified:
25/01/2024
Description
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



