First published: Wed Oct 23 2024(Updated: )
A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application. A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20382 is rated as a critical vulnerability due to its potential to allow unauthorized cross-site scripting attacks.
To remediate CVE-2024-20382, upgrade to the latest version of Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software as recommended by Cisco.
CVE-2024-20382 affects users of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software.
Yes, CVE-2024-20382 can be exploited by an unauthenticated, remote attacker through the VPN web client services.
CVE-2024-20382 can facilitate a cross-site scripting (XSS) attack, compromising the user's browser.