QID 317401
Date Published: 2023-12-13
QID 317401: Cisco Adaptive Security Appliance (ASA) Software Virtual Private Network (VPN) Packet Validation Vulnerability (cisco-sa-asa-ssl-vpn-Y88QOm77)
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address.
Affected Products
9.8.1 Prior to 9.12.4.62
9.14.1 Prior to 9.16.4.38
9.17.1 Prior to 9.17.1.33
9.18.1 Prior to 9.18.3.53
9.19.1 Prior to 9.19.1.18
QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using version command.
A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address.
Solution
Customers are advised to refer to cisco-sa-asa-ssl-vpn-Y88QOm77 for more information.
Vendor References
- cisco-sa-asa-ssl-vpn-Y88QOm77 -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-asa-ssl-vpn-Y88QOm77
CVEs related to QID 317401
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-asa-ssl-vpn-Y88QOm77 |
|