U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-20240

Change History

Initial Analysis by NIST 12/01/2023 9:19:07 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.00086:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.01095:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.02028:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.03047:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.03049:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.04043:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.04053:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.05042:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.9.06037:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:cisco:secure_client:4.10.00093:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.01075:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.02086:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.03104:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.04065:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.04071:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.05085:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.05095:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.05111:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.06079:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.06090:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.07061:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.07062:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:4.10.07073:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:5.0.00238:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:5.0.00529:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:5.0.00556:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:5.0.01242:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:5.0.02075:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:5.0.03072:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:secure_client:5.0.03076:*:*:*:*:*:*:*
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-125
Changed Reference Type
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8 No Types Assigned
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8 Issue Tracking, Vendor Advisory