Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device. This vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
Vulnerability Type
使用共享资源的并发执行不恰当同步问题(竞争条件)
Vulnerability Title
Cisco AnyConnect VPN 安全漏洞
Vulnerability Description
Cisco AnyConnect VPN是美国思科(Cisco)公司的一种虚拟专用网络(VPN)客户端,它支持远程用户通过 SSL VPN 和 IPSec VPN 连接到企业网络。 Cisco AnyConnect VPN存在安全漏洞,该漏洞源于 VPN 身份验证过程中使用的处理程序的熵值较弱以及同一过程中存在的竞争条件。允许未经身份验证的远程攻击者劫持 AnyConnect VPN 会话或导致受影响设备上的 AnyConnect VPN 服务的个人用户出现拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A