First published: Wed Oct 23 2024(Updated: )
A vulnerability in the TLS processing feature of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an issue that occurs when TLS traffic is processed. An attacker could exploit this vulnerability by sending certain TLS traffic over IPv4 through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition and impacting traffic to and through the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20339 has been classified as a denial of service (DoS) vulnerability.
To mitigate CVE-2024-20339, ensure you apply the latest patches released by Cisco for the Firepower Threat Defense (FTD) Software.
CVE-2024-20339 specifically affects Cisco Firepower 2100 Series devices running Firepower Threat Defense (FTD) Software.
Yes, CVE-2024-20339 can be exploited by unauthenticated, remote attackers.
CVE-2024-20339 can lead to a denial of service (DoS) condition on affected Cisco devices.