Flaw in Authentication Flow of Cisco VPN Software
CVE-2022-20928
Summary
A vulnerability in the VPN authentication and authorization processes of Cisco ASA and FTD software could enable an unauthenticated, remote attacker to connect as a different user. This flaw arises from inadequate verification of authorization during the VPN authentication process. An attacker can exploit this vulnerability by sending a specially crafted packet, necessitating valid credentials for establishing a VPN connection. If successful, the attacker could gain unauthorized access to the network with the privileges of another user, posing significant security risks.
Affected Version(s)
Cisco Adaptive Security Appliance (ASA) Software 9.8.1
Cisco Adaptive Security Appliance (ASA) Software 9.8.1.5
Cisco Adaptive Security Appliance (ASA) Software 9.8.1.7
References
CVSS V3.1
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved