The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-20042

CVE-2023-20042: Cisco Firepower Threat Defense DoS Flaw

CVE-2023-20042 is a denial of service vulnerability in Cisco Firepower Threat Defense affecting the AnyConnect SSL VPN feature. Attackers can exhaust session handlers to block new connections. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: February 4, 2026

CVE-2023-20042 Overview

A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.

Critical Impact

Remote attackers can exhaust the session handler pool on Cisco ASA and FTD devices without authentication, completely preventing legitimate VPN users from establishing new connections and disrupting enterprise remote access capabilities.

Affected Products

  • Cisco Adaptive Security Appliance (ASA) Software versions 9.16.x, 9.17.x, 9.18.x, and 9.19.x
  • Cisco Firepower Threat Defense (FTD) Software versions 7.0.x, 7.1.x, 7.2.x, and 7.3.x
  • Devices with AnyConnect SSL VPN feature enabled

Discovery Timeline

  • November 1, 2023 - CVE-2023-20042 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-20042

Vulnerability Analysis

This vulnerability (CWE-404: Improper Resource Shutdown or Release) stems from a flaw in how Cisco ASA and FTD software manages SSL/TLS session handlers within the AnyConnect SSL VPN feature. Under specific conditions during the SSL/TLS handshake process, session handlers are not properly released back to the resource pool, leading to a resource leak condition.

The attack is particularly concerning because it requires no authentication and can be executed remotely over the network. The vulnerability affects the changed scope, meaning the impact extends beyond the vulnerable component itself—while the ASA/FTD device's availability is compromised, there is no direct impact on confidentiality or integrity of data.

The resource exhaustion attack is cumulative in nature. Each crafted SSL/TLS connection has a probability of triggering a session handler leak. Over time, repeated exploitation attempts gradually deplete the finite pool of available session handlers until the device can no longer accept new VPN connections.

Root Cause

The root cause is an implementation error in the SSL/TLS session handling process. The session handler cleanup logic fails to execute under certain edge-case conditions during the SSL/TLS session lifecycle. When specific patterns of SSL/TLS traffic are processed, the code path responsible for releasing session handlers back to the available pool is bypassed, resulting in orphaned session handler objects that consume system resources indefinitely until the device is rebooted or the service is restarted.

Attack Vector

The attack vector is network-based and requires the attacker to send specially crafted SSL/TLS traffic to the AnyConnect SSL VPN interface of an affected device. The attack can be executed as follows:

  1. The attacker identifies a target device running vulnerable versions of Cisco ASA or FTD software with AnyConnect SSL VPN enabled
  2. The attacker initiates SSL/TLS connections with crafted parameters designed to trigger the session handler leak condition
  3. Each successful exploitation attempt leaks one or more session handlers from the available pool
  4. The attacker repeats the process until the session handler pool is exhausted
  5. Once depleted, legitimate users are unable to establish new VPN sessions, resulting in denial of service

The attack does not require valid credentials and can be launched by any entity capable of reaching the SSL VPN interface over the network.

Detection Methods for CVE-2023-20042

Indicators of Compromise

  • Gradual decrease in available session handler resources on ASA/FTD devices
  • Increasing number of failed VPN connection attempts from legitimate users
  • Unusual volume of SSL/TLS handshake traffic to the AnyConnect VPN interface
  • System logs indicating session handler pool exhaustion or resource allocation failures

Detection Strategies

  • Monitor session handler utilization metrics on ASA/FTD devices using show resource usage commands
  • Configure SNMP traps or syslog alerts for VPN subsystem resource threshold violations
  • Implement network traffic analysis to detect anomalous patterns of SSL/TLS connection attempts
  • Deploy intrusion detection signatures to identify crafted SSL/TLS traffic patterns associated with this vulnerability

Monitoring Recommendations

  • Establish baseline metrics for normal session handler utilization and alert on significant deviations
  • Enable detailed logging for the SSL VPN subsystem to capture connection attempt metadata
  • Monitor VPN user complaints and service desk tickets for patterns indicating connectivity issues
  • Correlate session handler depletion events with source IP addresses to identify potential attackers

How to Mitigate CVE-2023-20042

Immediate Actions Required

  • Review the Cisco Security Advisory for affected version details and fixed releases
  • Plan and schedule upgrades to patched software versions during maintenance windows
  • Monitor session handler resource utilization on affected devices for signs of active exploitation
  • Consider implementing rate limiting on SSL VPN connections as a temporary mitigation measure

Patch Information

Cisco has released security updates to address this vulnerability. Administrators should consult the Cisco Security Advisory (cisco-sa-asaftd-ssl-dos-kxG8mpUA) for specific fixed version information for their deployment. The advisory provides detailed upgrade paths for both ASA Software and FTD Software across all affected version trains.

For Cisco ASA Software, affected versions include 9.16.1 through 9.16.4.9, 9.17.1 through 9.17.1.20, 9.18.1 through 9.18.2.7, and 9.19.1. For Cisco FTD Software, affected versions span 7.0.0 through 7.0.5, 7.1.0 through 7.1.0.3, 7.2.0 through 7.2.3, and 7.3.0 through 7.3.1.1.

Workarounds

  • There are no complete workarounds for this vulnerability; software upgrades are required for full remediation
  • Implement access control lists (ACLs) to restrict SSL VPN access to trusted IP ranges where feasible
  • Configure connection rate limiting to slow down potential exploitation attempts
  • Enable Control Plane Policing (CoPP) to protect device resources from volumetric attacks
bash
# Example: Configure connection rate limiting on ASA (adjust values based on environment)
class-map type inspect vpn-rate-limit
 match access-group anyconnect-acl
policy-map type inspect vpn-policy
 class vpn-rate-limit
  set connection conn-max 100
  set connection per-client-max 5

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechCisco Firepower Threat Defense

  • SeverityHIGH

  • CVSS Score8.6

  • EPSS Probability0.25%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-404

  • NVD-CWE-noinfo
  • Vendor Resources
  • Cisco Security Advisory
  • Related CVEs
  • CVE-2024-20330: Cisco Firepower Threat Defense DoS Flaw

  • CVE-2022-20760: Cisco Firepower Threat Defense DoS Flaw

  • CVE-2022-20745: Cisco Firepower Threat Defense DoS Flaw

  • CVE-2022-20715: Cisco Firepower Threat Defense DoS Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English