Geolocation Access Control Vulnerability Could Bypass Policy

CVE-2024-20431

5.8MEDIUM

Key Information

Vendor
Cisco
Status
Cisco Firepower Threat Defense Software
Vendor
CVE Published:
23 October 2024

Badges

๐Ÿ‘พ Exploit Exists

Summary

A vulnerability in the geolocation access control feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass an access control policy.

This vulnerability is due to improper assignment of geolocation data. An attacker could exploit this vulnerability by sending traffic through an affected device. A successful exploit could allow the attacker to bypass a geolocation-based access control policy and successfully send traffic to a protected device.

Affected Version(s)

Cisco Firepower Threat Defense Software = 7.0.0

Cisco Firepower Threat Defense Software = 7.0.0.1

Cisco Firepower Threat Defense Software = 7.0.1

References

CVSS V3.1

Score:
5.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

Collectors

NVD DatabaseMitre Database
.