CVE-2024-20493

high-risk
Published 2024-10-23

A vulnerability in the login authentication functionality of the Remote Access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to deny further VPN user authentications for several minutes, resulting in a temporary denial of service (DoS) condition. This vulnerability is due to ineffective handling of memory resources during the authentication process. An attacker could exploit this vulnerability by sending crafted packets, which could cause resource exhaustion of the authentication process. A successful exploit could allow the attacker to deny authentication for Remote Access SSL VPN users for several minutes, resulting in a temporary DoS condition.

Do I need to act?

-
0.12% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10 Medium
NETWORK / LOW complexity

Affected Products (20)

Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software

Affected Vendors

55
/ 100
high-risk
Severity 21/34 · High
Exploitability 1/34 · Minimal
Exposure 33/34 · Critical