First published: Wed Oct 02 2024(Updated: )
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure | ||
Cisco Meraki MX | ||
Cisco Meraki Z Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X is classified as high, due to the potential for denial of service and session hijacking.
To fix cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X, apply the recommended firmware updates provided by Cisco for affected devices.
The devices affected by cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X include Cisco Meraki MX Series and Cisco Meraki Z Series Teleworker Gateways.
Yes, cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X can be exploited remotely by an unauthenticated attacker.
The potential impacts of cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X include unauthorized access to VPN sessions and denial of service conditions for users.