Cisco AnyConnect VPN Server vulnerable to DoS attack
CVE-2024-20502

7.5HIGH

Key Information:

Vendor

Cisco

Vendor
CVE Published:
2 October 2024

Badges

๐Ÿ‘พ Exploit Exists

What is CVE-2024-20502?

A vulnerability in the Cisco AnyConnect VPN server, present in Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices, allows an unauthenticated remote attacker to induce a Denial of Service (DoS) condition. This issue arises from inadequate resource management during the establishment of SSL VPN sessions. By sending a series of specially crafted HTTPS requests to the VPN server, an attacker can prevent the device from accepting new VPN connections. Importantly, existing SSL VPN sessions remain unaffected when this vulnerability is exploited. Fortunately, the Cisco AnyConnect VPN server is capable of recovering gracefully once the malicious traffic ceases, eliminating the need for manual intervention.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Cisco Meraki MX Firmware

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.