Cisco ASA/FTD VPN HTTPS DoS via Improper Request Handling
CVE-2023-20095 Published on November 1, 2023
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of HTTPS requests. An attacker could exploit this vulnerability by sending crafted HTTPS requests to an affected system. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a DoS condition.
Vulnerability Analysis
CVE-2023-20095 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
Missing Release of Resource after Effective Lifetime
The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed. When a resource is not released after use, it can allow attackers to cause a denial of service by causing the allocation of resources without triggering their release. Frequently-affected resources include memory, CPU, disk space, power or battery, etc.
Products Associated with CVE-2023-20095
stack.watch emails you whenever new vulnerabilities are published in Cisco Adaptive Security Appliance Software or Cisco Firepower Threat Defense. Just hit a watch button to start following.
Affected Versions
Cisco Adaptive Security Appliance (ASA) Software:- Version 9.8.1 is affected.
- Version 9.8.1.5 is affected.
- Version 9.8.1.7 is affected.
- Version 9.8.2 is affected.
- Version 9.8.2.8 is affected.
- Version 9.8.2.14 is affected.
- Version 9.8.2.15 is affected.
- Version 9.8.2.17 is affected.
- Version 9.8.2.20 is affected.
- Version 9.8.2.24 is affected.
- Version 9.8.2.26 is affected.
- Version 9.8.2.28 is affected.
- Version 9.8.2.33 is affected.
- Version 9.8.2.35 is affected.
- Version 9.8.2.38 is affected.
- Version 9.8.3.8 is affected.
- Version 9.8.3.11 is affected.
- Version 9.8.3.14 is affected.
- Version 9.8.3.16 is affected.
- Version 9.8.3.18 is affected.
- Version 9.8.3.21 is affected.
- Version 9.8.3 is affected.
- Version 9.8.3.26 is affected.
- Version 9.8.3.29 is affected.
- Version 9.8.4 is affected.
- Version 9.8.4.3 is affected.
- Version 9.8.4.7 is affected.
- Version 9.8.4.8 is affected.
- Version 9.8.4.10 is affected.
- Version 9.8.4.12 is affected.
- Version 9.8.4.15 is affected.
- Version 9.8.4.17 is affected.
- Version 9.8.4.25 is affected.
- Version 9.8.4.20 is affected.
- Version 9.8.4.22 is affected.
- Version 9.8.4.26 is affected.
- Version 9.8.4.29 is affected.
- Version 9.8.4.32 is affected.
- Version 9.8.4.33 is affected.
- Version 9.8.4.34 is affected.
- Version 9.8.4.35 is affected.
- Version 9.8.4.39 is affected.
- Version 9.8.4.40 is affected.
- Version 9.8.4.41 is affected.
- Version 9.8.4.43 is affected.
- Version 9.8.4.44 is affected.
- Version 9.8.4.45 is affected.
- Version 9.12.1 is affected.
- Version 9.12.1.2 is affected.
- Version 9.12.1.3 is affected.
- Version 9.12.2 is affected.
- Version 9.12.2.4 is affected.
- Version 9.12.2.5 is affected.
- Version 9.12.2.9 is affected.
- Version 9.12.3 is affected.
- Version 9.12.3.2 is affected.
- Version 9.12.3.7 is affected.
- Version 9.12.4 is affected.
- Version 9.12.3.12 is affected.
- Version 9.12.3.9 is affected.
- Version 9.12.2.1 is affected.
- Version 9.12.4.2 is affected.
- Version 9.12.4.4 is affected.
- Version 9.12.4.7 is affected.
- Version 9.12.4.10 is affected.
- Version 9.12.4.13 is affected.
- Version 9.12.4.8 is affected.
- Version 9.12.4.18 is affected.
- Version 9.12.4.24 is affected.
- Version 9.12.4.26 is affected.
- Version 9.12.4.29 is affected.
- Version 9.12.4.30 is affected.
- Version 9.12.4.35 is affected.
- Version 9.12.4.37 is affected.
- Version 9.12.4.38 is affected.
- Version 9.12.4.39 is affected.
- Version 9.12.4.40 is affected.
- Version 9.12.4.41 is affected.
- Version 9.14.1 is affected.
- Version 9.14.1.10 is affected.
- Version 9.14.1.6 is affected.
- Version 9.14.1.15 is affected.
- Version 9.14.1.19 is affected.
- Version 9.14.1.30 is affected.
- Version 9.14.2 is affected.
- Version 9.14.2.4 is affected.
- Version 9.14.2.8 is affected.
- Version 9.14.2.13 is affected.
- Version 9.14.2.15 is affected.
- Version 9.14.3 is affected.
- Version 9.14.3.1 is affected.
- Version 9.14.3.9 is affected.
- Version 9.14.3.11 is affected.
- Version 9.14.3.13 is affected.
- Version 9.14.3.18 is affected.
- Version 9.14.3.15 is affected.
- Version 9.14.4 is affected.
- Version 9.14.4.6 is affected.
- Version 9.14.4.7 is affected.
- Version 9.15.1 is affected.
- Version 9.15.1.7 is affected.
- Version 9.15.1.10 is affected.
- Version 9.15.1.15 is affected.
- Version 9.15.1.16 is affected.
- Version 9.15.1.17 is affected.
- Version 9.15.1.1 is affected.
- Version 9.15.1.21 is affected.
- Version 9.16.1 is affected.
- Version 9.16.1.28 is affected.
- Version 9.16.2 is affected.
- Version 9.16.2.3 is affected.
- Version 9.16.2.7 is affected.
- Version 9.16.2.11 is affected.
- Version 9.16.2.13 is affected.
- Version 9.16.2.14 is affected.
- Version 9.16.3 is affected.
- Version 9.16.3.3 is affected.
- Version 9.16.3.14 is affected.
- Version 9.17.1 is affected.
- Version 9.17.1.7 is affected.
- Version 9.17.1.9 is affected.
- Version 9.18.1 is affected.
- Version 6.2.3 is affected.
- Version 6.2.3.1 is affected.
- Version 6.2.3.2 is affected.
- Version 6.2.3.3 is affected.
- Version 6.2.3.4 is affected.
- Version 6.2.3.5 is affected.
- Version 6.2.3.6 is affected.
- Version 6.2.3.7 is affected.
- Version 6.2.3.8 is affected.
- Version 6.2.3.10 is affected.
- Version 6.2.3.11 is affected.
- Version 6.2.3.9 is affected.
- Version 6.2.3.12 is affected.
- Version 6.2.3.13 is affected.
- Version 6.2.3.14 is affected.
- Version 6.2.3.15 is affected.
- Version 6.2.3.16 is affected.
- Version 6.2.3.17 is affected.
- Version 6.2.3.18 is affected.
- Version 6.6.0 is affected.
- Version 6.6.0.1 is affected.
- Version 6.6.1 is affected.
- Version 6.6.3 is affected.
- Version 6.6.4 is affected.
- Version 6.6.5 is affected.
- Version 6.6.5.1 is affected.
- Version 6.6.5.2 is affected.
- Version 6.4.0 is affected.
- Version 6.4.0.1 is affected.
- Version 6.4.0.3 is affected.
- Version 6.4.0.2 is affected.
- Version 6.4.0.4 is affected.
- Version 6.4.0.5 is affected.
- Version 6.4.0.6 is affected.
- Version 6.4.0.7 is affected.
- Version 6.4.0.8 is affected.
- Version 6.4.0.9 is affected.
- Version 6.4.0.10 is affected.
- Version 6.4.0.11 is affected.
- Version 6.4.0.12 is affected.
- Version 6.4.0.13 is affected.
- Version 6.4.0.14 is affected.
- Version 6.4.0.15 is affected.
- Version 6.7.0 is affected.
- Version 6.7.0.1 is affected.
- Version 6.7.0.2 is affected.
- Version 6.7.0.3 is affected.
- Version 7.0.0 is affected.
- Version 7.0.0.1 is affected.
- Version 7.0.1 is affected.
- Version 7.0.1.1 is affected.
- Version 7.0.2 is affected.
- Version 7.0.2.1 is affected.
- Version 7.0.3 is affected.
- Version 7.1.0 is affected.
- Version 7.1.0.1 is affected.
- Version 7.1.0.2 is affected.
- Version 7.2.0 is affected.
- Version 7.2.0.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.