First published: Wed Oct 23 2024(Updated: )
A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol for VPN termination of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Secure Firewall Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-asaftd-ikev2-dos-9FgEyHsF vulnerability is classified as a denial of service (DoS) vulnerability that can potentially disrupt service.
To mitigate the cisco-sa-asaftd-ikev2-dos-9FgEyHsF vulnerability, it's recommended to apply the latest software updates from Cisco.
The affected products for cisco-sa-asaftd-ikev2-dos-9FgEyHsF include Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense.
Unauthenticated remote attackers can exploit the cisco-sa-asaftd-ikev2-dos-9FgEyHsF vulnerability to cause a denial of service.
The cisco-sa-asaftd-ikev2-dos-9FgEyHsF vulnerability was disclosed in a security advisory by Cisco.