Unknown
CVE-2024-20499
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2024-20499
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- meraki mx100 firmware,
- meraki mx105 firmware,
- meraki mx250 firmware,
- meraki mx400 firmware,
- meraki mx450 firmware,
- meraki mx600 firmware,
- meraki mx64 firmware,
- meraki mx64w firmware,
- meraki mx65 firmware,
- meraki mx65w firmware,
- meraki mx67 firmware,
- meraki mx67c firmware,
- meraki mx67w firmware,
- meraki mx68 firmware,
- meraki mx68cw firmware,
- meraki mx68w firmware,
- meraki mx75 firmware,
- meraki mx84 firmware,
- meraki mx85 firmware,
- meraki mx95 firmware,
- meraki vmx firmware,
- meraki z3 firmware,
- meraki z3c firmware,
- meraki z4 firmware,
- meraki z4c firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: