CVE-2022-20947
Cisco Adaptive Security Appliance (ASA) vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2022-20947) was discovered in the dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software. The vulnerability was disclosed on November 9, 2022, and affects systems with remote access SSL VPN enabled, HostScan enabled, and at least one custom DAP configured (Cisco Advisory).

Technical details

The vulnerability stems from improper processing of HostScan data received from the Posture (HostScan) module. It has been assigned CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The vulnerability has received a CVSS Base Score of 8.6 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H (Cisco Advisory).

Impact

A successful exploitation of this vulnerability could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition (Cisco Advisory).

Mitigation and workarounds

Cisco has released software updates that address this vulnerability. While there are no direct workarounds, administrators can disable HostScan by issuing the 'no hostscan enable' command in the configuration mode of the device. However, this mitigation should be evaluated for potential impacts on functionality or performance in the specific environment (Cisco Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management