Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j69q-qfwm-m736

Опубликовано: 18 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.6

Описание

A vulnerability in the SSL/TLS handler of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the affected device to reload unexpectedly, leading to a denial of service (DoS) condition. The vulnerability is due to improper error handling on established SSL/TLS connections. An attacker could exploit this vulnerability by establishing an SSL/TLS connection with the affected device and then sending a malicious SSL/TLS message within that connection. A successful exploit could allow the attacker to cause the device to reload.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

A vulnerability in the SSL/TLS handler of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the affected device to reload unexpectedly, leading to a denial of service (DoS) condition. The vulnerability is due to improper error handling on established SSL/TLS connections. An attacker could exploit this vulnerability by establishing an SSL/TLS connection with the affected device and then sending a malicious SSL/TLS message within that connection. A successful exploit could allow the attacker to cause the device to reload.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

EPSS

Процентиль: 82%
0.01771
Низкий

8.6 High

CVSS3

Дефекты

CWE-457

Связанные уязвимости

CVSS3: 8.6
nvd
около 1 года назад

A vulnerability in the SSL/TLS handler of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the affected device to reload unexpectedly, leading to a denial of service (DoS) condition. The vulnerability is due to improper error handling on established SSL/TLS connections. An attacker could exploit this vulnerability by establishing an SSL/TLS connection with the affected device and then sending a malicious SSL/TLS message within that connection. A successful exploit could allow the attacker to cause the device to reload.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

CVSS3: 8.6
fstec
больше 5 лет назад

Уязвимость модуля SSL/TLS микропрограммного обеспечения межсетевого экрана Cisco Adaptive Security Appliance, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 82%
0.01771
Низкий

8.6 High

CVSS3

Дефекты

CWE-457