A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asafdt-webvpn-dos-tzPSYern - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 8.6 |
Information
Published : 2022-05-03 04:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20745
Mitre link : CVE-2022-20745
CVE.ORG link : CVE-2022-20745
JSON object : View
Products Affected
cisco
- firepower_threat_defense
- adaptive_security_appliance_software
CWE
CWE-20
Improper Input Validation