First published: Wed Oct 23 2024(Updated: )
A vulnerability in the AnyConnect firewall for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should have been denied to flow through an affected device. This vulnerability is due to a logic error in populating group ACLs when an AnyConnect client establishes a new session toward an affected device. An attacker could exploit this vulnerability by establishing an AnyConnect connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20297 has been classified as a high severity vulnerability.
To fix CVE-2024-20297, update your Cisco Adaptive Security Appliance or Cisco Firepower Threat Defense Software to the latest version that addresses this vulnerability.
CVE-2024-20297 affects users of Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software.
Yes, CVE-2024-20297 can be exploited by an unauthenticated remote attacker.
CVE-2024-20297 can allow an attacker to bypass a configured access control list (ACL), potentially allowing unauthorized traffic.