CVE-2022-20760
Published May 3, 2022
Last updated a year ago
Overview
- Description
- A vulnerability in the DNS inspection handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service condition (DoS) on an affected device. This vulnerability is due to a lack of proper processing of incoming requests. An attacker could exploit this vulnerability by sending crafted DNS requests at a high rate to an affected device. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a DoS condition.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35AD28D3-1C08-44EF-9148-371C9E7912E5", "versionEndExcluding": "6.4.0.15" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD7675E1-AE0A-4C69-915D-144597F1250E", "versionEndExcluding": "6.6.5.2", "versionStartIncluding": "6.5.0" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "536C9927-B64A-4959-BE92-9F2665AEA811", "versionEndExcluding": "7.0.2", "versionStartIncluding": "7.0.0" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D619BF54-1BA9-45D0-A876-92D7010088A0" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66C2579F-1E8B-4FB1-AA40-B164F4F2BBED", "versionEndExcluding": "9.12.4.38" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFE84A5D-FFD6-4A82-BDFA-367D29625300", "versionEndExcluding": "9.14.4", "versionStartIncluding": "9.13.0" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B120E68-DA48-4B87-A549-6BA7009C056D", "versionEndExcluding": "9.15.1.21", "versionStartIncluding": "9.15.0" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99DD72E2-E389-453E-8A99-1B633C4E2AE3", "versionEndExcluding": "9.16.2.14", "versionStartIncluding": "9.16.0" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "573E61F7-8311-4095-BD75-8F3D3E2499E5", "versionEndExcluding": "9.17.1.7", "versionStartIncluding": "9.17.0" } ], "operator": "OR" } ] } ]