First published: Tue Dec 05 2023(Updated: )
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address.This vulnerability is due to
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-asa-ssl-vpn-Y88QOm77 is classified as high, due to the potential for remote exploitation by authenticated attackers.
To fix cisco-sa-asa-ssl-vpn-Y88QOm77, it is recommended to upgrade to the latest patched version of Cisco ASA or FTD software.
Organizations using Cisco Adaptive Security Appliance Software or Cisco Firepower Threat Defense Software with the AnyConnect SSL VPN feature are affected by cisco-sa-asa-ssl-vpn-Y88QOm77.
The potential impacts of cisco-sa-asa-ssl-vpn-Y88QOm77 include unauthorized access to network resources and data by manipulating VPN user identity through source IP address spoofing.
Currently, there are no officially recommended workarounds for cisco-sa-asa-ssl-vpn-Y88QOm77; patching is the advised solution.