Unknown
CVE-2024-20513
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2024-20513
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device.
This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- meraki mx100 firmware,
- meraki mx105 firmware,
- meraki mx250 firmware,
- meraki mx400 firmware,
- meraki mx450 firmware,
- meraki mx600 firmware,
- meraki mx64 firmware,
- meraki mx64w firmware,
- meraki mx65 firmware,
- meraki mx65w firmware,
- meraki mx67 firmware,
- meraki mx67c firmware,
- meraki mx67w firmware,
- meraki mx68 firmware,
- meraki mx68cw firmware,
- meraki mx68w firmware,
- meraki mx75 firmware,
- meraki mx84 firmware,
- meraki mx85 firmware,
- meraki mx95 firmware,
- meraki vmx firmware,
- meraki z3 firmware,
- meraki z3c firmware,
- meraki z4 firmware,
- meraki z4c firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: