Input validation error in Cisco Systems, Inc products - CVE-2022-20933
Published: October 20, 2022
Vulnerability identifier: #VU68524
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2022-20933
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Meraki MX
Meraki Z3
Cisco Meraki Z3C
Cisco Meraki MX67CW
Cisco Meraki MX67W
Cisco Meraki MX68CW
Cisco Meraki MX68W
Cisco Meraki MX64
Cisco Meraki MX64W
Cisco Meraki MX65
Cisco Meraki MX65W
Cisco Meraki MX67
Cisco Meraki MX68
Cisco Meraki MX75
Cisco Meraki MX84
Cisco Meraki MX85
Cisco Meraki MX95
Cisco Meraki MX100
Cisco Meraki MX105
Cisco Meraki MX250
Cisco Meraki MX400
Cisco Meraki MX450
Cisco Meraki MX600
Cisco Meraki vMX
Meraki MX
Meraki Z3
Cisco Meraki Z3C
Cisco Meraki MX67CW
Cisco Meraki MX67W
Cisco Meraki MX68CW
Cisco Meraki MX68W
Cisco Meraki MX64
Cisco Meraki MX64W
Cisco Meraki MX65
Cisco Meraki MX65W
Cisco Meraki MX67
Cisco Meraki MX68
Cisco Meraki MX75
Cisco Meraki MX84
Cisco Meraki MX85
Cisco Meraki MX95
Cisco Meraki MX100
Cisco Meraki MX105
Cisco Meraki MX250
Cisco Meraki MX400
Cisco Meraki MX450
Cisco Meraki MX600
Cisco Meraki vMX
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. A remote attacker can send a specially crafted request to the application and perform a denial of service (DoS) attack.
Remediation
Install updates from vendor's website.