Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2022-20737 First vendor Publication 2022-05-03
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Overall CVSS Score 7.1
Base Score 7.1 Environmental Score 7.1
impact SubScore 4.2 Temporal Score 7.1
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact Low
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:P/I:N/A:C)
Cvss Base Score 7 Attack Range Network
Cvss Impact Score 7.8 Attack Complexity Medium
Cvss Expoit Score 6.8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the handler for HTTP authentication for resources accessed through the Clientless SSL VPN portal of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device or to obtain portions of process memory from an affected device. This vulnerability is due to insufficient bounds checking when parsing specific HTTP authentication messages. An attacker could exploit this vulnerability by sending malicious traffic to an affected device acting as a VPN Gateway. To send this malicious traffic, an attacker would need to control a web server that can be accessed through the Clientless SSL VPN portal. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition, or to retrieve bytes from the device process memory that may contain sensitive information.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20737

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 170
Os 801

Sources (Detail)

Source Url
CISCO https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Date Informations
2024-11-02 02:32:21
  • Multiple Updates
2024-10-31 13:29:47
  • Multiple Updates
2024-10-30 02:30:38
  • Multiple Updates
2024-04-27 02:47:44
  • Multiple Updates
2023-11-07 21:32:30
  • Multiple Updates
2023-09-19 13:20:38
  • Multiple Updates
2023-08-17 02:11:52
  • Multiple Updates
2023-08-16 13:13:57
  • Multiple Updates
2023-08-16 02:10:57
  • Multiple Updates
2023-08-12 13:30:21
  • Multiple Updates
2023-08-09 13:13:24
  • Multiple Updates
2023-08-06 13:20:11
  • Multiple Updates
2023-08-06 01:24:42
  • Multiple Updates
2023-08-04 13:20:36
  • Multiple Updates
2023-08-04 01:25:04
  • Multiple Updates
2023-07-14 13:20:38
  • Multiple Updates
2023-07-14 01:24:50
  • Multiple Updates
2023-03-29 02:22:33
  • Multiple Updates
2023-03-28 12:25:00
  • Multiple Updates
2022-10-11 13:11:44
  • Multiple Updates
2022-10-11 01:24:23
  • Multiple Updates
2022-05-27 12:55:43
  • Multiple Updates
2022-05-26 02:03:38
  • Multiple Updates
2022-05-24 02:08:13
  • Multiple Updates
2022-05-13 09:23:00
  • Multiple Updates
2022-05-04 02:01:20
  • Multiple Updates
2022-05-04 01:59:45
  • Multiple Updates
2022-05-03 17:22:53
  • Multiple Updates
2022-05-03 09:22:55
  • First insertion