A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.

Project Subscriptions

Vendors Products
Meraki Mx100 Subscribe
Meraki Mx100 Firmware Subscribe
Meraki Mx105 Subscribe
Meraki Mx105 Firmware Subscribe
Meraki Mx250 Subscribe
Meraki Mx250 Firmware Subscribe
Meraki Mx400 Subscribe
Meraki Mx400 Firmware Subscribe
Meraki Mx450 Subscribe
Meraki Mx450 Firmware Subscribe
Meraki Mx600 Subscribe
Meraki Mx600 Firmware Subscribe
Meraki Mx64 Subscribe
Meraki Mx64 Firmware Subscribe
Meraki Mx64w Subscribe
Meraki Mx64w Firmware Subscribe
Meraki Mx65 Subscribe
Meraki Mx65 Firmware Subscribe
Meraki Mx65w Subscribe
Meraki Mx65w Firmware Subscribe
Meraki Mx67 Subscribe
Meraki Mx67 Firmware Subscribe
Meraki Mx67cw Subscribe
Meraki Mx67cw Firmware Subscribe
Meraki Mx67w Subscribe
Meraki Mx67w Firmware Subscribe
Meraki Mx68 Subscribe
Meraki Mx68 Firmware Subscribe
Meraki Mx68cw Subscribe
Meraki Mx68cw Firmware Subscribe
Meraki Mx68w Subscribe
Meraki Mx68w Firmware Subscribe
Meraki Mx75 Subscribe
Meraki Mx75 Firmware Subscribe
Meraki Mx84 Subscribe
Meraki Mx84 Firmware Subscribe
Meraki Mx85 Subscribe
Meraki Mx85 Firmware Subscribe
Meraki Mx95 Subscribe
Meraki Mx95 Firmware Subscribe
Meraki Vmx Subscribe
Meraki Vmx Firmware Subscribe
Meraki Z3 Subscribe
Meraki Z3 Firmware Subscribe
Meraki Z3c Subscribe
Meraki Z3c Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-26183 A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 01 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-01T18:48:56.789Z

Reserved: 2021-11-02T00:00:00

Link: CVE-2022-20933

cve-icon Vulnrichment

Updated: 2024-08-03T02:31:57.978Z

cve-icon NVD

Status : Modified

Published: 2022-10-26T15:15:14.713

Modified: 2024-11-21T06:43:51.123

Link: CVE-2022-20933

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses