Monday, November 18, 2024
HomeCiscoCisco AnyConnect SSL VPN Flaw Let Remote Attacker Launch DoS Attack

Cisco AnyConnect SSL VPN Flaw Let Remote Attacker Launch DoS Attack

Published on

A vulnerability of medium severity, identified as CVE-2023-20042, with a CVSS score of 6.8, was found in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defence (FTD) Software. 

This vulnerability could potentially enable an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

Software patches from Cisco have been made available to fix this issue. There are no workarounds that address this vulnerability.

- Advertisement - SIEM as a Service

Details of the Cisco AnyConnect SSL VPN Flaw

An implementation issue in the SSL/TLS session handling procedure, which could prevent the release of a session handler under certain circumstances, is the cause of the vulnerability discovered.

An attacker might use this vulnerability to increase the likelihood of session handler leaks by sending crafted SSL/TLS traffic to a compromised device.

“A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition,” Cisco said in its advisory.

Affected Products

Cisco stated that this flaw impacted Cisco ASA and FTD software that had been configured for AnyConnect SSL/TLS VPN connections.

Indicators of Compromise

According to Cisco, the command shows SSL objects may be used to identify the presence of leaking session handlers. A high and rising number in the SSL: active counter suggests that sessions are being leaked.

As stated in the advisory, Cisco recommends that affected users apply software updates as early as possible. Cisco confirmed that there are no workarounds that address this vulnerability.

Protect vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a Free Trial to ensure 100% security.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution,...

Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability

Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing...

GeoVision 0-Day Vulnerability Exploited in the Wild

Cybersecurity researchers have detected the active exploitation of a zero-day vulnerability in GeoVision devices,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution,...

Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability

Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing...