// For flags

CVE-2022-20742

Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IPsec IKEv2 VPN Information Disclosure Vulnerability

Severity Score

7.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel. This vulnerability is due to an improper implementation of Galois/Counter Mode (GCM) ciphers. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a sufficient number of encrypted messages across an affected IPsec IKEv2 VPN tunnel and then using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to decrypt, read, modify, and re-encrypt data that is transmitted across an affected IPsec IKEv2 VPN tunnel.

Una vulnerabilidad en una biblioteca de VPN IPsec del software Cisco Adaptive Security Appliance (ASA) y del software Cisco Firepower Threat Defense (FTD) podría permitir a un atacante remoto no autenticado leer o modificar datos dentro de un túnel VPN IPsec IKEv2. Esta vulnerabilidad es debido a una implementación inapropiada de los cifrados del modo Galois/Contrafigura (GCM). Un atacante en una posición de hombre en el medio podría explotar esta vulnerabilidad al interceptar un número suficiente de mensajes encriptados a través de un túnel VPN IPsec IKEv2 afectado y, a continuación, usando técnicas de criptoanálisis para romper el cifrado. Una explotación con éxito podría permitir al atacante descifrar, leer, modificar y volver a cifrar los datos que son transmiten a través de un túnel VPN IPsec IKEv2 afectado

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2021-11-02 CVE Reserved
  • 2022-05-03 CVE Published
  • 2024-07-19 EPSS Updated
  • 2024-11-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-325: Missing Cryptographic Step
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
< 6.4.0.15
Search vendor "Cisco" for product "Firepower Threat Defense" and version " < 6.4.0.15"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.5.0 < 6.6.5.2
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.5.0 < 6.6.5.2"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 7.0.0 < 7.0.2
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 7.0.0 < 7.0.2"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
7.1.0
Search vendor "Cisco" for product "Firepower Threat Defense" and version "7.1.0"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
< 9.12.4.38
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " < 9.12.4.38"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.13.0 < 9.14.4
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.13.0 < 9.14.4"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.15.0 < 9.15.1.21
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.15.0 < 9.15.1.21"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.16.0 < 9.16.2.14
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.16.0 < 9.16.2.14"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.17.0 < 9.17.1.7
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.17.0 < 9.17.1.7"
-
Affected