First published: Wed Oct 23 2024(Updated: )
A vulnerability in the login authentication functionality of the Remote Access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to deny further VPN user authentications for
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-asa-vpn-4gYEWMKg is considered high due to the potential for unauthenticated remote attackers to disrupt VPN user authentication.
To fix cisco-sa-asa-vpn-4gYEWMKg, update your Cisco Adaptive Security Appliance or Cisco Firepower Threat Defense software to the latest patched version.
Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense users with the Remote Access SSL VPN feature enabled are affected by cisco-sa-asa-vpn-4gYEWMKg.
cisco-sa-asa-vpn-4gYEWMKg facilitates denial of further VPN user authentication by unauthorized attackers.
Currently, there is no documented workaround for cisco-sa-asa-vpn-4gYEWMKg, so applying the update is the recommended course of action.