First published: Wed Oct 23 2024(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause an unexpected reload of the device. This vulnerability is due to insufficient input validation of SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device using IPv4 or IPv6. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects all versions of SNMP (versions 1, 2c, and 3) and requires a valid SNMP community string or valid SNMPv3 user credentials.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20268 has a medium severity rating as it can cause unexpected device reboots.
To address CVE-2024-20268, update the Cisco Adaptive Security Appliance Software or Cisco Firepower Threat Defense Software to the latest version.
CVE-2024-20268 affects Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software.
Yes, CVE-2024-20268 can be exploited by an authenticated remote attacker.
The impact of CVE-2024-20268 includes causing the device to unexpectedly reload, leading to temporary service disruption.