A vulnerability in the TCP packet processing of Cisco...
High severity
Unreviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Aug 25, 2023
Description
Published by the National Vulnerability Database
Oct 21, 2020
Published to the GitHub Advisory Database
May 24, 2022
Last updated
Aug 25, 2023
A vulnerability in the TCP packet processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory exhaustion condition. An attacker could exploit this vulnerability by sending a high rate of crafted TCP traffic through an affected device. A successful exploit could allow the attacker to exhaust device resources, resulting in a DoS condition for traffic transiting the affected device.
References