Логотип exploitDog
bind:CVE-2020-27124
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-27124

Количество 3

Количество 3

nvd логотип

CVE-2020-27124

около 1 года назад

A vulnerability in the SSL/TLS handler of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the affected device to reload unexpectedly, leading to a denial of service (DoS) condition. The vulnerability is due to improper error handling on established SSL/TLS connections. An attacker could exploit this vulnerability by establishing an SSL/TLS connection with the affected device and then sending a malicious SSL/TLS message within that connection. A successful exploit could allow the attacker to cause the device to reload.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-j69q-qfwm-m736

около 1 года назад

A vulnerability in the SSL/TLS handler of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the affected device to reload unexpectedly, leading to a denial of service (DoS) condition. The vulnerability is due to improper error handling on established SSL/TLS connections. An attacker could exploit this vulnerability by establishing an SSL/TLS connection with the affected device and then sending a malicious SSL/TLS message within that connection. A successful exploit could allow the attacker to cause the device to reload.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2020-05504

больше 5 лет назад

Уязвимость модуля SSL/TLS микропрограммного обеспечения межсетевого экрана Cisco Adaptive Security Appliance, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-27124

A vulnerability in the SSL/TLS handler of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the affected device to reload unexpectedly, leading to a denial of service (DoS) condition. The vulnerability is due to improper error handling on established SSL/TLS connections. An attacker could exploit this vulnerability by establishing an SSL/TLS connection with the affected device and then sending a malicious SSL/TLS message within that connection. A successful exploit could allow the attacker to cause the device to reload.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

CVSS3: 8.6
2%
Низкий
около 1 года назад
github логотип
GHSA-j69q-qfwm-m736

A vulnerability in the SSL/TLS handler of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the affected device to reload unexpectedly, leading to a denial of service (DoS) condition. The vulnerability is due to improper error handling on established SSL/TLS connections. An attacker could exploit this vulnerability by establishing an SSL/TLS connection with the affected device and then sending a malicious SSL/TLS message within that connection. A successful exploit could allow the attacker to cause the device to reload.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

CVSS3: 8.6
2%
Низкий
около 1 года назад
fstec логотип
BDU:2020-05504

Уязвимость модуля SSL/TLS микропрограммного обеспечения межсетевого экрана Cisco Adaptive Security Appliance, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
2%
Низкий
больше 5 лет назад

Уязвимостей на страницу