Cisco ASA Software Vulnerability - Remote Reboot Attack Possible
CVE-2024-20408

7.7HIGH

Key Information:

Badges

👾 Exploit Exists

Summary

A vulnerability exists in the Dynamic Access Policies (DAP) feature of Cisco's Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software. This issue arises from improper validation of data in HTTPS POST requests, which can be exploited by an authenticated remote attacker possessing valid VPN user credentials. Upon successful exploitation, the attacker can send specially crafted HTTPS POST requests to the affected device, causing it to unexpectedly reload. This behavior results in a denial of service condition, potentially disrupting services for users relying on the affected systems.

Affected Version(s)

Cisco Adaptive Security Appliance (ASA) Software 9.8.1

Cisco Adaptive Security Appliance (ASA) Software 9.8.1.5

Cisco Adaptive Security Appliance (ASA) Software 9.8.1.7

References

CVSS V3.1

Score:
7.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

.