CVE-2022-20795 (CNNVD-202204-3900)
中文标题:
Cisco Firepower Threat Defense和Cisco Adaptive Security Appliances Software 数据伪造问题漏洞
英文标题:
Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software AnyConnect SSL VPN Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliances Software(ASA Software)都是美国思科(Cisco)公司的产品。Cisco Firepower Threat Defense是一套提供下一代防火墙服务的统一软件。Cisco Adaptive Security Appliances Software是一套防火墙和网络安全平台。该平台提供了对数据和网络资源的高度安全的访问等功能。 Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliances Software(ASA Software)存在数据伪造问题漏洞,该漏洞源于在建立 DTLS 隧道作为 AnyConnect SSL VPN 连接的一部分时出现的处理不理想。攻击者利用此漏洞可以通过向受影响的设备发送稳定的特制 DTLS 流量流。 成功的利用可能允许攻击者耗尽受影响 VPN 头端设备上的资源。这可能会导致现有 DTLS 隧道停止传递流量并阻止新的 DTLS 隧道建立,从而导致 DoS 条件。以下产品和版本受到影响:ASA 软件版本 9.16.3 或之前版本、ASA 软件版本 9.17.1.9 或之前版本、FTD 软件版本 7.0.1 或之前版本和FTD 软件版本 7.1.0.1 或之前版本。
英文描述:
A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition. This vulnerability is due to suboptimal processing that occurs when establishing a DTLS tunnel as part of an AnyConnect SSL VPN connection. An attacker could exploit this vulnerability by sending a steady stream of crafted DTLS traffic to an affected device. A successful exploit could allow the attacker to exhaust resources on the affected VPN headend device. This could cause existing DTLS tunnels to stop passing traffic and prevent new DTLS tunnels from establishing, resulting in a DoS condition. Note: When the attack traffic stops, the device recovers gracefully.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Adaptive Security Appliance (ASA) Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_adaptive_security_appliance_(asa)_software:n_a:*:*:*:*:*:*:*
|
| cisco | adaptive_security_appliance | * | - | - |
cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*
|
| cisco | adaptive_security_appliance_software | * | - | - |
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
|
| cisco | firepower_threat_defense | * | - | - |
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2022-20795 |
2025-11-11 15:21:15 | 2025-11-11 07:37:15 |
| NVD | nvd_CVE-2022-20795 |
2025-11-11 14:58:17 | 2025-11-11 07:45:32 |
| CNNVD | cnnvd_CNNVD-202204-3900 |
2025-11-11 15:10:52 | 2025-11-11 07:57:15 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202204-3900
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 4
- data_sources: ['cve'] -> ['cve', 'nvd']