Cisco ASA Software Vulnerability Could Allow Root Access via SSH

CVE-2024-20329

9.9CRITICAL

Key Information

Vendor
Cisco
Status
Cisco Adaptive Security Appliance (asa) Software
Vendor
CVE Published:
23 October 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

The first article discusses a critical vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software, marked as CVE-2024-20329, which allows an authenticated remote attacker to execute operating system commands with root-level privileges. The impact of this vulnerability is significant, as an attacker with limited user privileges could gain complete control over the system. Although there is active exploitation of this vulnerability, no specific ransomware attacks have been reported. It is recommended to apply the software updates provided by Cisco to mitigate this vulnerability.

The second article addresses a denial of service flaw in Cisco ASA and Firepower Threat Defense (FTD) software. Tracked as CVE-2024-20481, this vulnerability allows unauthenticated remote attackers to cause a DoS of the Remote Access VPN (RAVPN) service. While there is active exploitation of this flaw, it has not been used to target Cisco ASA devices specifically in DoS attacks. However, it was discovered as part of large-scale brute force password attacks against VPN services on various networking hardware. The impact of this vulnerability is significant, as it can lead to a DoS of the RAVPN service on the affected device, potentially impacting the availability of the service. It is crucial for system admins to apply the provided updates to address this flaw.

The third article highlights a vulnerability, tracked as CVE-2024-20329, in Cisco ASA Software that allows remote attackers to execute commands with root-level privileges. This deficiency in user input validation within the Secure Shell (SSH) subsystem poses a significant risk, impacting confidentiality, integrity, and availability. Cisco has released software updates to address this vulnerability, and customers are advised to upgrade to the fixed software versions as soon as possible. It is recommended to regularly consult Cisco's Security Advisories page for thorough exposure assessments and upgrade solutions.

Overall, all three articles stress the importance of applying the provided software updates from Cisco to mitigate the identified vulnerabilities, which could have severe impacts on affected systems if exploited. The availability of exploit attempts and active exploitation of some of the flaws underscores the urgency of addressing these vulnerabilities to prevent potential system compromise.

Affected Version(s)

Cisco Adaptive Security Appliance (ASA) Software = 9.17.1

Cisco Adaptive Security Appliance (ASA) Software = 9.17.1.7

Cisco Adaptive Security Appliance (ASA) Software = 9.17.1.9

News Articles

Cisco fixes VPN DoS flaw discovered in password spray attacks

Cisco fixed a denial of service flaw in its Cisco ASA and Firepower Threat Defense (FTD) software, which was discovered during large-scale brute force attacks against Cisco VPN devices in April.

2 months ago

Cisco ASA Devices Vulnerable to SSH Remote Command Injection Flaw

Cisco has issued a critical security advisory regarding a vulnerability in its Adaptive Security Appliance (ASA) Software.

2 months ago

References

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by GBHackers

  • Vulnerability published

Collectors

NVD DatabaseMitre Database2 News Article(s)
.