First published: Tue May 03 2022(Updated: )
A vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel. This vulnerability is due to an improper implementation of Galois/Counter Mode (GCM) ciphers. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a sufficient number of encrypted messages across an affected IPsec IKEv2 VPN tunnel and then using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to decrypt, read, modify, and re-encrypt data that is transmitted across an affected IPsec IKEv2 VPN tunnel.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | <6.4.0.15 | |
Cisco Firepower Threat Defense | >=6.5.0<6.6.5.2 | |
Cisco Firepower Threat Defense | >=7.0.0<7.0.2 | |
Cisco Firepower Threat Defense | =7.1.0 | |
Cisco Adaptive Security Appliance Software | <9.12.4.38 | |
Cisco Adaptive Security Appliance Software | >=9.13.0<9.14.4 | |
Cisco Adaptive Security Appliance Software | >=9.15.0<9.15.1.21 | |
Cisco Adaptive Security Appliance Software | >=9.16.0<9.16.2.14 | |
Cisco Adaptive Security Appliance Software | >=9.17.0<9.17.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20742 is a vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software.
CVE-2022-20742 allows an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel.
The severity of CVE-2022-20742 is high with a CVSS score of 7.4.
The affected software versions include Cisco Adaptive Security Appliance (ASA) Software versions up to 9.17.1.7 and Cisco Firepower Threat Defense (FTD) Software versions up to 6.6.5.2.
To fix CVE-2022-20742, it is recommended to upgrade to a fixed software version provided by Cisco.