漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
Cisco AnyConnect VPN 安全漏洞
Vulnerability Description
Cisco AnyConnect VPN是美国思科(Cisco)公司的一种虚拟专用网络(VPN)客户端,它支持远程用户通过 SSL VPN 和 IPSec VPN 连接到企业网络。 Cisco AnyConnect VPN存在安全漏洞,该漏洞源于 VPN 身份验证过程中使用的处理程序的熵值较弱以及同一过程中存在的竞争条件。允许未经身份验证的远程攻击者对受影响设备上的 AnyConnect VPN 服务造成拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A