First published: Wed Oct 02 2024(Updated: )
Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition to the AnyConnect VPN service on an affected device.For more
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meraki MX | ||
Cisco Meraki Z Series Teleworker Gateway | ||
Cisco AnyConnect Secure Mobility Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The cisco-sa-meraki-mx-vpn-dos-QTRHzG2 vulnerability is classified as a denial of service (DoS) issue.
To mitigate the cisco-sa-meraki-mx-vpn-dos-QTRHzG2 vulnerability, ensure that your Cisco Meraki MX or Z Series devices are updated to the latest firmware version provided by Cisco.
The cisco-sa-meraki-mx-vpn-dos-QTRHzG2 vulnerability affects Cisco Meraki MX devices, Cisco Meraki Z Series Teleworker Gateways, and Cisco AnyConnect VPN services.
Exploiting the cisco-sa-meraki-mx-vpn-dos-QTRHzG2 vulnerability could result in service interruptions, preventing users from establishing VPN connections.
Currently, the recommended action for cisco-sa-meraki-mx-vpn-dos-QTRHzG2 is to apply the latest security updates from Cisco, as no specific workaround is provided.