Authentication Bypass in Cisco Adaptive Security Appliance and Firepower Threat Defense
CVE-2023-20247
Key Information:
- Vendor
- Cisco
- Vendor
- CVE Published:
- 1 November 2023
Summary
A security flaw exists in the remote access SSL VPN functionality of Cisco Adaptive Security Appliance and Firepower Threat Defense software. This flaw can be exploited by authenticated remote attackers, enabling them to bypass multiple certificate authentication policies. The vulnerability arises from improper error handling during the authentication process. Attackers can send specially crafted requests while establishing a remote access VPN session, allowing them to connect using only a valid username and password, thereby gaining access without the necessary certificates. This exploitation retains the privileges and permissions linked to the legitimate connection profile, potentially leading to unauthorized access.
Affected Version(s)
Cisco Adaptive Security Appliance (ASA) Software 9.8.1
Cisco Adaptive Security Appliance (ASA) Software 9.8.1.5
Cisco Adaptive Security Appliance (ASA) Software 9.8.1.7
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved