First published: Wed Oct 23 2024(Updated: )
A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to execute operating system commands as root. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by submitting crafted input when executing remote CLI commands over SSH. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20329 is considered a critical vulnerability due to its potential to allow remote command execution as root.
To remediate CVE-2024-20329, apply the latest security updates issued by Cisco for the Adaptive Security Appliance Software.
CVE-2024-20329 affects users of Cisco Adaptive Security Appliance Software that utilize the SSH subsystem.
CVE-2024-20329 enables an authenticated, remote attacker to execute arbitrary operating system commands.
CVE-2024-20329 is caused by insufficient validation of user input in the SSH subsystem.