Severity
5.9MEDIUM
EPSS
1.0%
top 23.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 23

Description

A vulnerability in the session authentication functionality of the Remote Access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to prevent users from authenticating. This vulnerability is due to insufficient entropy in the authentication process. An attacker could exploit this vulnerability by determining the handle of an authenticating user and using it to terminate their auth

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 2.2 | Impact: 4.0

Affected Packages4 packages

🔴Vulnerability Details

3
GHSA
GHSA-jrcg-6c8x-ff3h: A vulnerability in the session authentication functionality of the Remote Access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software a2024-10-23
CVEList
Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Authentication DoS Vulnerability2024-10-23
GHSA
In XWiki Platform, payloads stored in content is executed when a user with script/programming right edit them2024-08-19

📋Vendor Advisories

1
Cisco
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability2024-10-23
CVE-2024-20331 (MEDIUM CVSS 5.9) | A vulnerability in the session auth | cvebase.io