Unknown
CVE-2024-20509
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2024-20509
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device.
This vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- meraki mx100 firmware,
- meraki mx105 firmware,
- meraki mx250 firmware,
- meraki mx400 firmware,
- meraki mx450 firmware,
- meraki mx600 firmware,
- meraki mx64 firmware,
- meraki mx64w firmware,
- meraki mx65 firmware,
- meraki mx65w firmware,
- meraki mx67 firmware,
- meraki mx67c firmware,
- meraki mx67w firmware,
- meraki mx68 firmware,
- meraki mx68cw firmware,
- meraki mx68w firmware,
- meraki mx75 firmware,
- meraki mx84 firmware,
- meraki mx85 firmware,
- meraki mx95 firmware,
- meraki vmx firmware,
- meraki z3 firmware,
- meraki z3c firmware,
- meraki z4 firmware,
- meraki z4c firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: