QID 317401

Date Published: 2023-12-13

QID 317401: Cisco Adaptive Security Appliance (ASA) Software Virtual Private Network (VPN) Packet Validation Vulnerability (cisco-sa-asa-ssl-vpn-Y88QOm77)

A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address.

Affected Products
9.8.1 Prior to 9.12.4.62
9.14.1 Prior to 9.16.4.38
9.17.1 Prior to 9.17.1.33
9.18.1 Prior to 9.18.3.53
9.19.1 Prior to 9.19.1.18

QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using version command.

A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address.

  • CVSS V3 rated as Medium - 4.3 severity.
  • CVSS V2 rated as Medium - 4 severity.
  • Solution

    Customers are advised to refer to cisco-sa-asa-ssl-vpn-Y88QOm77 for more information.

    CVEs related to QID 317401

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-asa-ssl-vpn-Y88QOm77 URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-Y88QOm77