First published: Wed Oct 23 2024(Updated: )
A vulnerability in the Network Service Group (NSG) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. This vulnerability is due to a logic error that occurs when NSG ACLs are populated on an affected device. An attacker could exploit this vulnerability by establishing a connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20384 has been assigned a high severity rating due to its potential to allow unauthorized access to restricted network traffic.
To mitigate CVE-2024-20384, it is recommended to update to the latest version of Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software that addresses this vulnerability.
CVE-2024-20384 affects users of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software that utilize the Network Service Group feature.
The impact of CVE-2024-20384 allows an unauthenticated remote attacker to bypass configured access control lists, leading to unauthorized access to network traffic.
Currently, the recommended course of action for CVE-2024-20384 is to apply vendor patches rather than relying on workarounds.