{"vulnerability": "CVE-2023-20042", "sightings": [{"uuid": "632b86e9-319a-4f82-8213-9faf9fb45045", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20042", "type": "seen", "source": "https://t.me/cibsecurity/73380", "content": "\u203c CVE-2023-20042 \u203c\n\nA vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-01T21:22:15.000000Z"}, {"uuid": "533496cc-5cb4-48b0-95df-48fd594281c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20042", "type": "seen", "source": "https://t.me/arpsyndicate/352", "content": "#ExploitObserverAlert\n\nCVE-2023-20042\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-20042. A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-22T15:29:04.000000Z"}]}