CVE-2023-20275

CWE-346CWE-74CWE-955 documents5 sources
Severity
4.3MEDIUM
EPSS
0.1%
top 76.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 12

Description

A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. This vulnerability is due to improper validation of the packet's inner source IP address after decryption. An attacker could exploit this vulnerability by sending crafted packets through the tunnel. A successful exploit could allow the attacke

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:NExploitability: 2.3 | Impact: 1.4

Affected Packages4 packages

🔴Vulnerability Details

3
CVEList
CVE-2023-20275: A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Softwar2023-12-12
GHSA
GHSA-6q64-g7xj-vc8f: A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Softwar2023-12-12
GHSA
XWiki Platform vulnerable to privilege escalation from view right on XWiki.AttachmentSelector2023-04-20

📋Vendor Advisories

1
Cisco
Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Packet Validation Vulnerability2023-12-05
CVE-2023-20275 (MEDIUM CVSS 4.3) | A vulnerability in the AnyConnect S | cvebase.io