First published: Wed Oct 23 2024(Updated: )
A vulnerability in the Remote Access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition on
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-asa-vpn-cZf8gT is classified as high due to its potential to cause a denial of service.
To fix cisco-sa-asa-vpn-cZf8gT, update your Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software to the latest patched version.
Organizations using Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software are affected by cisco-sa-asa-vpn-cZf8gT.
The impact of cisco-sa-asa-vpn-cZf8gT could result in an unexpected device reload and subsequent denial of service.
Currently, there are no specific workarounds for cisco-sa-asa-vpn-cZf8gT, so applying the update is the recommended course of action.