Authentication Bypass in Cisco Adaptive Security Appliance and Firepower Threat Defense
CVE-2023-20247

5MEDIUM

Key Information:

Badges

๐Ÿ‘พ Exploit Exists

What is CVE-2023-20247?

A security flaw exists in the remote access SSL VPN functionality of Cisco Adaptive Security Appliance and Firepower Threat Defense software. This flaw can be exploited by authenticated remote attackers, enabling them to bypass multiple certificate authentication policies. The vulnerability arises from improper error handling during the authentication process. Attackers can send specially crafted requests while establishing a remote access VPN session, allowing them to connect using only a valid username and password, thereby gaining access without the necessary certificates. This exploitation retains the privileges and permissions linked to the legitimate connection profile, potentially leading to unauthorized access.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Cisco Adaptive Security Appliance (ASA) Software 9.8.1

Cisco Adaptive Security Appliance (ASA) Software 9.8.1.5

Cisco Adaptive Security Appliance (ASA) Software 9.8.1.7

References

CVSS V3.1

Score:
5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.