First published: Wed Oct 23 2024(Updated: )
A vulnerability in the SSL VPN feature for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a logic error in memory management when the device is handling SSL VPN connections. An attacker could exploit this vulnerability by sending crafted SSL/TLS packets to the SSL VPN server of the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-20402 is classified as high due to its potential to cause a denial of service condition.
To fix CVE-2024-20402, apply the latest patches provided by Cisco for the Adaptive Security Appliance Software and Firepower Threat Defense Software.
CVE-2024-20402 affects Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software.
The impact of CVE-2024-20402 can lead to an unexpected reload of the affected device, resulting in a denial of service.
As of now, there have been no confirmed reports of active exploitation of CVE-2024-20402 in the wild.