CVE-2023-20042

A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
ciscoCNA
6.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
VendorProductVersion
ciscofirepower_threat_defense
7.0.0
ciscofirepower_threat_defense
7.0.0.1
ciscofirepower_threat_defense
7.0.1
ciscofirepower_threat_defense
7.0.1.1
ciscofirepower_threat_defense
7.0.2
ciscofirepower_threat_defense
7.0.2.1
ciscofirepower_threat_defense
7.0.3
ciscofirepower_threat_defense
7.0.4
ciscofirepower_threat_defense
7.0.5
ciscofirepower_threat_defense
7.1.0
ciscofirepower_threat_defense
7.1.0.1
ciscofirepower_threat_defense
7.1.0.2
ciscofirepower_threat_defense
7.1.0.3
ciscofirepower_threat_defense
7.2.0
ciscofirepower_threat_defense
7.2.0.1
ciscofirepower_threat_defense
7.2.1
ciscofirepower_threat_defense
7.2.2
ciscofirepower_threat_defense
7.2.3
ciscofirepower_threat_defense
7.3.0
ciscofirepower_threat_defense
7.3.1
ciscofirepower_threat_defense
7.3.1.1
ciscoadaptive_security_appliance_software
9.16.1
ciscoadaptive_security_appliance_software
9.16.1.28
ciscoadaptive_security_appliance_software
9.16.2
ciscoadaptive_security_appliance_software
9.16.2.3
ciscoadaptive_security_appliance_software
9.16.2.7
ciscoadaptive_security_appliance_software
9.16.2.11
ciscoadaptive_security_appliance_software
9.16.2.13
ciscoadaptive_security_appliance_software
9.16.2.14
ciscoadaptive_security_appliance_software
9.16.3
ciscoadaptive_security_appliance_software
9.16.3.3
ciscoadaptive_security_appliance_software
9.16.3.14
ciscoadaptive_security_appliance_software
9.16.3.15
ciscoadaptive_security_appliance_software
9.16.3.19
ciscoadaptive_security_appliance_software
9.16.3.23
ciscoadaptive_security_appliance_software
9.16.4
ciscoadaptive_security_appliance_software
9.16.4.9
ciscoadaptive_security_appliance_software
9.17.1
ciscoadaptive_security_appliance_software
9.17.1.7
ciscoadaptive_security_appliance_software
9.17.1.9
ciscoadaptive_security_appliance_software
9.17.1.10
ciscoadaptive_security_appliance_software
9.17.1.11
ciscoadaptive_security_appliance_software
9.17.1.13
ciscoadaptive_security_appliance_software
9.17.1.15
ciscoadaptive_security_appliance_software
9.17.1.20
ciscoadaptive_security_appliance_software
9.18.1
ciscoadaptive_security_appliance_software
9.18.1.3
ciscoadaptive_security_appliance_software
9.18.2
ciscoadaptive_security_appliance_software
9.18.2.5
ciscoadaptive_security_appliance_software
9.18.2.7
ciscoadaptive_security_appliance_software
9.19.1
𝑥
= Vulnerable software versions