CVE-2022-20933

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
ciscoCNA
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
ciscomeraki_mx64_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx64_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx64w_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx64w_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx65_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx65_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx65w_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx65w_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx67_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx67_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx67cw_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx67cw_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx67w_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx67w_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx68_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx68_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx68cw_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx68cw_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx68w_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx68w_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx75_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx75_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx84_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx84_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx85_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx85_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx95_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx95_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx100_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx100_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx105_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx105_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx250_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx250_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx400_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx400_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx450_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx450_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_mx600_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_mx600_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_vmx_firmware
16.2.0 ≤
𝑥
< 16.16.6
ciscomeraki_vmx_firmware
17.0.0 ≤
𝑥
< 17.10.1
ciscomeraki_z3c_firmware
-
ciscomeraki_z3_firmware
-
𝑥
= Vulnerable software versions