First published: Wed May 22 2024(Updated: )
A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense (FTD) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-20261 is currently assessed as critical due to its potential impact on security policies that protect encrypted archive files.
To fix CVE-2024-20261, ensure that you update your Cisco Firepower Threat Defense software to the latest version provided by Cisco.
Organizations using Cisco Firepower Threat Defense software to inspect encrypted archive files are affected by CVE-2024-20261.
Yes, CVE-2024-20261 can be exploited remotely by an unauthenticated attacker, allowing them to bypass file policies.
CVE-2024-20261 can enable attacks that involve bypassing security measures meant to block malicious encrypted archive files.