CVE-2022-20927
Published on: Not Yet Published
Last Modified on: 11/22/2022 02:46:00 PM UTC
CVE-2022-20927 - advisory for cisco-sa-ssl-client-dos-cCrQPkA
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Adaptive Security Appliance from Cisco contain the following vulnerability:
A vulnerability in the SSL/TLS client of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management when a device initiates SSL/TLS connections. An attacker could exploit this vulnerability by ensuring that the device will connect to an SSL/TLS server that is using specific encryption parameters. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.
- CVE-2022-20927 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | tools.cisco.com text/html |
![]() |
Related QID Numbers
- 317267 Cisco Adaptive Security Appliance (ASA) Software SSL/Transport Layer Security (TLS) Client Denial of Service (DoS) Vulnerability (cisco-sa-ssl-client-dos-cCrQPkA)
- 317272 Firepower Threat Defense (FTD) Software SSL/Transport Layer Security (TLS) Client Denial of Service (DoS) Vulnerability (cisco-sa-ssl-client-dos-cCrQPkA)
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.10:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.12:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.13:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.16:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.19:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.21:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.7:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.10:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.15:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.19:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.30:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2.13:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2.15:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2.4:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2.8:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.3.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.3.11:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.3.13:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.3.15:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.3.18:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.14.3.9:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.10:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.15:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.16:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.17:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.21:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.7:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_services_software_for_asa:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|