CVE-2024-20513

moderate-risk
Published 2024-10-02

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device. This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate.

Do I need to act?

-
0.30% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.8/10 Medium
NETWORK / LOW complexity

Affected Products (20)

Meraki Mx100 Firmware
Meraki Mx95 Firmware
Meraki Mx85 Firmware
Meraki Mx84 Firmware
Meraki Mx75 Firmware
Meraki Mx68W Firmware
Meraki Mx68Cw Firmware
Meraki Mx68 Firmware
Meraki Mx67W Firmware
Meraki Mx67C Firmware
Meraki Mx67 Firmware
Meraki Mx65W Firmware
Meraki Mx64W Firmware
Meraki Mx65 Firmware
Meraki Mx64 Firmware
Meraki Z4C Firmware
Meraki Z4 Firmware
Meraki Z3C Firmware
Meraki Z3 Firmware
Meraki Vmx Firmware

Affected Vendors

44
/ 100
moderate-risk
Severity 22/34 · High
Exploitability 1/34 · Minimal
Exposure 21/34 · High