CVE-2023-20086
HIGH
Published 2023-11-01T16:42:43.902Z
Actions:
CVSS Score
V3.1
8.6
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.001
probability
of exploitation in the wild
There is a 0.1% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.470
Higher than 47.0% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
A vulnerability in ICMPv6 processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper processing of ICMPv6 messages. An attacker could exploit this vulnerability by sending crafted ICMPv6 messages to a targeted Cisco ASA or FTD system with IPv6 enabled. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
9.8.1
9.8.1.5
9.8.1.7
9.8.2
9.8.2.8
9.8.2.14
9.8.2.15
9.8.2.17
9.8.2.20
9.8.2.24
9.8.2.26
9.8.2.28
9.8.2.33
9.8.2.35
9.8.2.38
9.8.3.8
9.8.3.11
9.8.3.14
9.8.3.16
9.8.3.18
9.8.3.21
9.8.3
9.8.3.26
9.8.3.29
9.8.4
9.8.4.3
9.8.4.7
9.8.4.8
9.8.4.10
9.8.4.12
9.8.4.15
9.8.4.17
9.8.4.25
9.8.4.20
9.8.4.22
9.8.4.26
9.8.4.29
9.8.4.32
9.8.4.33
9.8.4.34
9.8.4.35
9.8.4.39
9.8.4.40
9.8.4.41
9.8.4.43
9.8.4.44
9.8.4.45
9.8.4.46
9.8.4.48
9.12.1
9.12.1.2
9.12.1.3
9.12.2
9.12.2.4
9.12.2.5
9.12.2.9
9.12.3
9.12.3.2
9.12.3.7
9.12.4
9.12.3.12
9.12.3.9
9.12.2.1
9.12.4.2
9.12.4.4
9.12.4.7
9.12.4.10
9.12.4.13
9.12.4.8
9.12.4.18
9.12.4.24
9.12.4.26
9.12.4.29
9.12.4.30
9.12.4.35
9.12.4.37
9.12.4.38
9.12.4.39
9.12.4.40
9.12.4.41
9.12.4.47
9.12.4.48
9.12.4.50
9.12.4.52
9.12.4.54
9.12.4.55
9.14.1
9.14.1.10
9.14.1.15
9.14.1.19
9.14.1.30
9.14.2
9.14.2.4
9.14.2.8
9.14.2.13
9.14.2.15
9.14.3
9.14.3.1
9.14.3.9
9.14.3.11
9.14.3.13
9.14.3.18
9.14.3.15
9.14.4
9.14.4.6
9.14.4.7
9.14.4.12
9.14.4.13
9.14.4.14
9.14.4.15
9.14.4.17
9.14.4.22
9.15.1
9.15.1.7
9.15.1.10
9.15.1.15
9.15.1.16
9.15.1.17
9.15.1.1
9.15.1.21
9.16.1
9.16.1.28
9.16.2
9.16.2.3
9.16.2.7
9.16.2.11
9.16.2.13
9.16.2.14
9.16.3
9.16.3.3
9.16.3.14
9.16.3.15
9.16.3.19
9.16.3.23
9.16.4
9.16.4.9
9.17.1
9.17.1.7
9.17.1.9
9.17.1.10
9.17.1.11
9.17.1.13
9.17.1.15
9.17.1.20
9.18.1
9.18.1.3
9.18.2
9.18.2.5
9.18.2.7
9.18.2.8
9.19.1
Affected Versions:
6.2.3
6.2.3.1
6.2.3.2
6.2.3.3
6.2.3.4
6.2.3.5
6.2.3.6
6.2.3.7
6.2.3.8
6.2.3.10
6.2.3.11
6.2.3.9
6.2.3.12
6.2.3.13
6.2.3.14
6.2.3.15
6.2.3.16
6.2.3.17
6.2.3.18
6.6.0
6.6.0.1
6.6.1
6.6.3
6.6.4
6.6.5
6.6.5.1
6.6.5.2
6.6.7
6.6.7.1
6.4.0
6.4.0.1
6.4.0.3
6.4.0.2
6.4.0.4
6.4.0.5
6.4.0.6
6.4.0.7
6.4.0.8
6.4.0.9
6.4.0.10
6.4.0.11
6.4.0.12
6.4.0.13
6.4.0.14
6.4.0.15
6.4.0.16
6.7.0
6.7.0.1
6.7.0.2
6.7.0.3
7.0.0
7.0.0.1
7.0.1
7.0.1.1
7.0.2
7.0.2.1
7.0.3
7.0.4
7.0.5
7.1.0
7.1.0.1
7.1.0.2
7.1.0.3
7.2.0
7.2.0.1
7.2.1
7.2.2
7.2.3
7.3.0
7.3.1
7.3.1.1
Published: 2023-11-01T16:42:43.902Z
Last Modified: 2024-08-02T08:57:35.691Z
Copied to clipboard!