A vulnerability of medium severity, identified as CVE-2023-20042, with a CVSS score of 6.8, was found in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defence (FTD) Software.
This vulnerability could potentially enable an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
Software patches from Cisco have been made available to fix this issue. There are no workarounds that address this vulnerability.
An implementation issue in the SSL/TLS session handling procedure, which could prevent the release of a session handler under certain circumstances, is the cause of the vulnerability discovered.
An attacker might use this vulnerability to increase the likelihood of session handler leaks by sending crafted SSL/TLS traffic to a compromised device.
“A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition,” Cisco said in its advisory.
Cisco stated that this flaw impacted Cisco ASA and FTD software that had been configured for AnyConnect SSL/TLS VPN connections.
According to Cisco, the command shows SSL objects may be used to identify the presence of leaking session handlers. A high and rising number in the SSL: active counter suggests that sessions are being leaked.
As stated in the advisory, Cisco recommends that affected users apply software updates as early as possible. Cisco confirmed that there are no workarounds that address this vulnerability.
Protect vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a Free Trial to ensure 100% security.
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…