Monday, December 4, 2023

Cisco AnyConnect SSL VPN Flaw Let Remote Attacker Launch DoS Attack

A vulnerability of medium severity, identified as CVE-2023-20042, with a CVSS score of 6.8, was found in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defence (FTD) Software. 

This vulnerability could potentially enable an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

Software patches from Cisco have been made available to fix this issue. There are no workarounds that address this vulnerability.

Details of the Cisco AnyConnect SSL VPN Flaw

An implementation issue in the SSL/TLS session handling procedure, which could prevent the release of a session handler under certain circumstances, is the cause of the vulnerability discovered.

FREE Trial

Patch Manager Plus to Patch Over 850 Third-party Applications.

Patch Manager Plus, our all-around patching solution, offers automated patch deployment for Windows, macOS, and Linux endpoints, along with patching support for 950+ third-party updates across 850+ third party applications..

An attacker might use this vulnerability to increase the likelihood of session handler leaks by sending crafted SSL/TLS traffic to a compromised device.

“A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition,” Cisco said in its advisory.

Affected Products

Cisco stated that this flaw impacted Cisco ASA and FTD software that had been configured for AnyConnect SSL/TLS VPN connections.

Indicators of Compromise

According to Cisco, the command shows SSL objects may be used to identify the presence of leaking session handlers. A high and rising number in the SSL: active counter suggests that sessions are being leaked.

As stated in the advisory, Cisco recommends that affected users apply software updates as early as possible. Cisco confirmed that there are no workarounds that address this vulnerability.

Protect vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a Free Trial to ensure 100% security.


Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles