Unknown
CVE-2024-20500
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2024-20500
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
This vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- meraki mx100 firmware,
- meraki mx105 firmware,
- meraki mx250 firmware,
- meraki mx400 firmware,
- meraki mx450 firmware,
- meraki mx600 firmware,
- meraki mx64 firmware,
- meraki mx64w firmware,
- meraki mx65 firmware,
- meraki mx65w firmware,
- meraki mx67 firmware,
- meraki mx67c firmware,
- meraki mx67w firmware,
- meraki mx68 firmware,
- meraki mx68cw firmware,
- meraki mx68w firmware,
- meraki mx75 firmware,
- meraki mx84 firmware,
- meraki mx85 firmware,
- meraki mx95 firmware,
- meraki vmx firmware,
- meraki z3 firmware,
- meraki z3c firmware,
- meraki z4 firmware,
- meraki z4c firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: