Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-20042
HistoryNov 01, 2023 - 6:15 p.m.

Design/Logic Flaw

2023-11-0118:15:00
PRIOn knowledge base
www.prio-n.com
5
cisco
anyconnect
ssl vpn
vulnerability
remote attacker
denial of service
implementation error
ssl/tls traffic
session handler
exploit
session handler pool

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.1%

A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.1%

Related for PRION:CVE-2023-20042