First published: Wed Oct 23 2024(Updated: )
A vulnerability in the AnyConnect firewall for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should have been denied to flow through an affected device. This vulnerability is due to a logic error in populating group ACLs when an AnyConnect client establishes a new session toward an affected device. An attacker could exploit this vulnerability by establishing an AnyConnect connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20299 is classified as a high severity vulnerability that allows unauthenticated remote attackers to bypass access control lists.
To fix CVE-2024-20299, apply the latest patches provided by Cisco for both the Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software.
The potential impacts of CVE-2024-20299 include unauthorized access to restricted network traffic, compromising the security of the affected systems.
CVE-2024-20299 affects Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software.
No, CVE-2024-20299 can be exploited by unauthenticated remote attackers, making it particularly dangerous.