Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Cisco Meraki MX and Z3 Teleworker Gateway VPN Denial of Service Vulnerability
Vulnerability Description
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Vulnerability Type
未对缺失参数进行处理
Vulnerability Title
Cisco Meraki MX Series Security Appliances 安全漏洞
Vulnerability Description
Cisco Meraki MX Series Security Appliances是美国思科(Cisco)公司的Meraki MX 系列的安全路由器。该设备具有LTE、SD-WAN、状态防火墙和集成的Sourcefire入侵防御(IPS)引擎以确保网络安全。 Cisco Meraki MX Series Security Appliances 存在安全漏洞,该漏洞源于客户端验证不足,可能允许未经身份验证的远程攻击者在受影响的设备上造成拒绝服务(DoS),攻击者可以通过制作恶意请求并将其发送到受影响的设备
CVSS Information
N/A
Vulnerability Type
N/A