CVE-2024-20513

MEDIUM

Cisco Meraki MX/Z Series - DoS

Title source: llm
STIX 2.1

Description

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device. This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate.

Scores

CVSS v3 5.8
EPSS 0.0030
EPSS Percentile 53.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-639
Status published
Products (25)
cisco/meraki_mx100_firmware 16.2 - 18.211.2
cisco/meraki_mx105_firmware 16.2 - 18.211.2
cisco/meraki_mx250_firmware 16.2 - 18.211.2
cisco/meraki_mx400_firmware 16.2 - 18.211.2
cisco/meraki_mx450_firmware 16.2 - 18.211.2
cisco/meraki_mx600_firmware 16.2 - 18.211.2
cisco/meraki_mx64_firmware 17.6.0 - 18.211.2
cisco/meraki_mx64w_firmware 16.2 - 18.211.2
cisco/meraki_mx65_firmware 17.6.0 - 18.211.2
cisco/meraki_mx65w_firmware 16.2 - 18.211.2
... and 15 more
Published Oct 02, 2024
Tracked Since Feb 18, 2026