Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause incoming TCP SYN packets to be dropped incorrectly. This vulnerability is due to improper handling of new, incoming TCP connections that are destined to management or data interfaces when the device is under a TCP SYN flood attack. An attacker could exploit this vulnerability by sending a crafted stream of traffic to an affected device. A successful exploit could allow the attacker to prevent all incoming TCP connections to the device from being established, including remote management access, Remote Access VPN (RAVPN) connections, and all network protocols that are TCP-based. This results in a denial of service (DoS) condition for affected features.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Vulnerability Type
对已超过有效生命周期的资源丧失索引
Vulnerability Title
Cisco Secure Firewall Adaptive Security Appliance 安全漏洞
Vulnerability Description
Cisco Secure Firewall Adaptive Security Appliance是美国思科(Cisco)公司的一个企业级防火墙软件。 Cisco Secure Firewall Adaptive Security Appliance存在安全漏洞,该漏洞源于在TCP SYN泛洪攻击下对新传入TCP连接的处理不当,可能导致未经验证的远程攻击者造成拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A