CVE-2022-20933 (CNNVD-202210-1459)
中文标题:
Cisco Meraki MX Series Security Appliances 安全漏洞
英文标题:
Cisco Meraki MX and Z3 Teleworker Gateway VPN Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Meraki MX Series Security Appliances是美国思科(Cisco)公司的Meraki MX 系列的安全路由器。该设备具有LTE、SD-WAN、状态防火墙和集成的Sourcefire入侵防御(IPS)引擎以确保网络安全。 Cisco Meraki MX Series Security Appliances 存在安全漏洞,该漏洞源于客户端验证不足,可能允许未经身份验证的远程攻击者在受影响的设备上造成拒绝服务(DoS),攻击者可以通过制作恶意请求并将其发送到受影响的设备来利用此漏洞,成功的利用可能允许攻击者导致服务器崩溃并重新启动,从而导致已建立的连接失败并强制远程用户启动新的连接并重新进行身份验证。
英文描述:
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Meraki MX Firmware | n/a | - | - |
cpe:2.3:a:cisco:cisco_meraki_mx_firmware:n_a:*:*:*:*:*:*:*
|
| cisco | meraki_mx64_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx64w_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx65_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx65w_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx67_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx67cw_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx67w_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx68_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx68cw_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx68w_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx75_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx84_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx85_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx95_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx100_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx105_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx250_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx400_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx450_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_mx600_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_vmx_firmware | * | - | - |
cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*
|
| cisco | meraki_z3c_firmware | - | - | - |
cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*
|
| cisco | meraki_z3_firmware | - | - | - |
cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2022-20933 |
2025-11-11 15:21:16 | 2025-11-11 07:37:15 |
| NVD | nvd_CVE-2022-20933 |
2025-11-11 14:58:27 | 2025-11-11 07:45:32 |
| CNNVD | cnnvd_CNNVD-202210-1459 |
2025-11-11 15:11:02 | 2025-11-11 07:57:35 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202210-1459
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 24
- data_sources: ['cve'] -> ['cve', 'nvd']