Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow Vulnerability

<p class=”line874″>A vulnerability in the handler for HTTP authentication for resources accessed through the Clientless SSL VPN portal of Cisco&nbsp;Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device or to obtain portions of process memory from an affected device.</p>
<p><span class=”more”>This vulnerability is due to insufficient bounds checking when parsing specific HTTP authentication messages. An attacker could exploit this vulnerability by sending malicious traffic to an affected device acting as a VPN Gateway. To send this malicious traffic, an attacker would need to control a web server that can be accessed through the Clientless SSL VPN portal. </span>A successful exploit could allow the attacker to <span class=”more”>cause the device to reload, resulting in a DoS condition, or to retrieve bytes from the device process memory that may contain sensitive information.<br></span></p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”” target=”_blank”></a></p>

<p>This advisory is part of the April 2022 release of the Cisco&nbsp;ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see <a href=”″>Cisco&nbsp;Event Response: April 2022 Cisco&nbsp;ASA, FMC, and FTD Software Security Advisory Bundled Publication</a>.</p>

Security Impact Rating: High

CVE: CVE-2022-20737


  • No Related Posts

Leave a Reply