Flaw in Authentication Flow of Cisco VPN Software
CVE-2022-20928

5.8MEDIUM

Key Information:

Badges

👾 Exploit Exists

Summary

A vulnerability in the VPN authentication and authorization processes of Cisco ASA and FTD software could enable an unauthenticated, remote attacker to connect as a different user. This flaw arises from inadequate verification of authorization during the VPN authentication process. An attacker can exploit this vulnerability by sending a specially crafted packet, necessitating valid credentials for establishing a VPN connection. If successful, the attacker could gain unauthorized access to the network with the privileges of another user, posing significant security risks.

Affected Version(s)

Cisco Adaptive Security Appliance (ASA) Software 9.8.1

Cisco Adaptive Security Appliance (ASA) Software 9.8.1.5

Cisco Adaptive Security Appliance (ASA) Software 9.8.1.7

References

CVSS V3.1

Score:
5.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.