
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2023-20095) was discovered in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software. The vulnerability was disclosed on November 1, 2023, as part of Cisco's semiannual security advisory bundle. This security flaw could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on affected devices (Cisco Advisory).
The vulnerability stems from improper handling of HTTPS requests in the remote access VPN feature. It has been assigned a CVSS v3.1 base score of 8.6 HIGH with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (NVD).
A successful exploitation of this vulnerability could allow an attacker to cause resource exhaustion, resulting in a denial of service (DoS) condition on the affected device. This could potentially disrupt VPN services and affect the availability of the security appliance (Cisco Advisory).
Cisco has released software updates that address this vulnerability. No workarounds are available for this vulnerability, making it critical for affected users to apply the appropriate software updates (Cisco Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."