CVE-2024-20494

HIGH

Cisco ASA/FTD - DoS

Title source: llm
STIX 2.1

Description

A vulnerability in the TLS cryptography functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper data validation during the TLS 1.3 handshake. An attacker could exploit this vulnerability by sending a crafted TLS 1.3 packet to an affected system through a TLS 1.3-enabled listening socket. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: This vulnerability can also impact the integrity of a device by causing VPN HostScan communication failures or file transfer failures when Cisco ASA Software is upgraded using Cisco Adaptive Security Device Manager (ASDM).

Scores

CVSS v3 8.6
EPSS 0.0044
EPSS Percentile 63.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-1287
Status published
Products (25)
cisco/adaptive_security_appliance_software 9.19.1
cisco/adaptive_security_appliance_software 9.19.1.5
cisco/adaptive_security_appliance_software 9.19.1.9
cisco/adaptive_security_appliance_software 9.19.1.12
cisco/adaptive_security_appliance_software 9.19.1.18
cisco/adaptive_security_appliance_software 9.19.1.22
cisco/adaptive_security_appliance_software 9.19.1.24
cisco/adaptive_security_appliance_software 9.19.1.27
cisco/adaptive_security_appliance_software 9.19.1.28
cisco/adaptive_security_appliance_software 9.19.1.31
... and 15 more
Published Oct 23, 2024
Tracked Since Feb 18, 2026