Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-20275 |
CWE-ID | CWE-345 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco Adaptive Security Appliance (ASA) Hardware solutions / Security hardware applicances Cisco Firepower Threat Defense (FTD) Hardware solutions / Security hardware applicances |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU83885
Risk: Low
CVSSv3.1: 3.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-20275
CWE-ID:
CWE-345 - Insufficient Verification of Data Authenticity
Exploit availability: No
DescriptionThe vulnerability allows a remote user to impersonate other VPN users.
The vulnerability exists due to improper validation of the packet's inner source IP address after decryption in the AnyConnect SSL VPN feature. A remote user can send specially crafted packets through the tunnel, impersonate another VPN user's IP address and receive return packets.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCisco Adaptive Security Appliance (ASA): All versions
Cisco Firepower Threat Defense (FTD): All versions
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-Y88QOm77
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd98316
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.