A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. This vulnerability is due to improper validation of the packet's inner source IP address after decryption. An attacker could exploit this vulnerability by sending crafted packets through the tunnel. A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address. It is not possible for the attacker to receive return packets.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2023-12-12T18:06:17.467Z

Updated: 2024-08-02T09:05:36.246Z

Reserved: 2022-10-27T18:47:50.374Z

Link: CVE-2023-20275

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-12T18:15:16.520

Modified: 2024-11-21T07:41:03.457

Link: CVE-2023-20275

cve-icon Redhat

No data.