Vulnerability in Cisco Adaptive Security Appliance SSL VPN Feature
CVE-2023-20275
4.3MEDIUM
Key Information:
- Vendor
- Cisco
- Vendor
- CVE Published:
- 12 December 2023
Summary
An issue exists within the SSL VPN feature of Cisco's Adaptive Security Appliance and Firepower Threat Defense software that allows an authenticated remote attacker to craft packets with another VPN user's source IP address due to insufficient validation of the packet's inner source IP after decryption. Exploitation enables an attacker to send packets that mimic another user's IP address, creating a potential for unauthorized actions, although the attacker does not receive any return packets.
Affected Version(s)
Cisco Adaptive Security Appliance (ASA) Software 9.8.1
Cisco Adaptive Security Appliance (ASA) Software 9.8.1.5
Cisco Adaptive Security Appliance (ASA) Software 9.8.1.7
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved