First published: Wed Oct 23 2024(Updated: )
A vulnerability in the session authentication functionality of the Remote Access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to prevent users from
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-asa-vpn-nyH3fhp is categorized as high due to its potential impact on remote user access.
To fix cisco-sa-asa-vpn-nyH3fhp, update your Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense software to the latest patched version.
The implications of cisco-sa-asa-vpn-nyH3fhp include the ability for unauthenticated attackers to disrupt remote access for users.
If you are using Cisco Adaptive Security Appliance or Cisco Firepower Threat Defense software, your system may be affected by cisco-sa-asa-vpn-nyH3fhp.
The primary risk associated with cisco-sa-asa-vpn-nyH3fhp is unauthorized denial of service for remote users attempting to connect.