Description
A vulnerability in the AnyConnect firewall for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should have been denied to flow through an affected device. This vulnerability is due to a logic error in populating group ACLs when an AnyConnect client establishes a new session toward an affected device. An attacker could exploit this vulnerability by establishing an AnyConnect connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.
Reserved 2023-11-08 | Published 2024-10-23 | Updated 2024-10-24 | Assigner
ciscoMEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Problem types
Authentication Bypass by Spoofing
Product status
Default status
unknown
9.12.3
affected
9.8.3
affected
9.12.1
affected
9.8.1
affected
9.12.2
affected
9.8.2.45
affected
9.8.2
affected
9.8.4
affected
9.14.1
affected
9.12.4
affected
9.8.2.26
affected
9.8.2.24
affected
9.8.2.15
affected
9.8.2.14
affected
9.8.2.35
affected
9.8.2.20
affected
9.8.2.8
affected
9.8.2.17
affected
9.8.2.28
affected
9.8.2.33
affected
9.8.2.38
affected
9.8.4.25
affected
9.12.3.2
affected
9.12.3.7
affected
9.8.3.18
affected
9.8.3.14
affected
9.8.4.15
affected
9.8.4.8
affected
9.8.1.7
affected
9.8.3.29
affected
9.14.1.10
affected
9.12.2.5
affected
9.8.4.22
affected
9.12.3.12
affected
9.8.4.7
affected
9.8.4.17
affected
9.8.3.16
affected
9.8.4.20
affected
9.8.3.11
affected
9.12.1.3
affected
9.8.4.3
affected
9.12.2.4
affected
9.8.4.12
affected
9.12.1.2
affected
9.8.3.26
affected
9.8.1.5
affected
9.12.2.9
affected
9.12.3.9
affected
9.8.3.21
affected
9.8.4.10
affected
9.12.2.1
affected
9.12.4.2
affected
9.14.1.6
affected
9.8.3.8
affected
9.14.1.15
affected
9.14.1.19
affected
9.8.4.26
affected
9.12.4.4
affected
9.14.1.30
affected
9.8.4.29
affected
9.12.4.7
affected
9.15.1
affected
9.14.2
affected
9.12.4.8
affected
9.8.4.32
affected
9.12.4.10
affected
9.14.2.4
affected
9.15.1.7
affected
9.14.2.8
affected
9.12.4.13
affected
9.8.4.33
affected
9.15.1.10
affected
9.14.2.13
affected
9.8.4.34
affected
9.12.4.18
affected
9.15.1.15
affected
9.8.4.35
affected
9.14.2.15
affected
9.12.4.24
affected
9.16.1
affected
9.15.1.16
affected
9.8.4.39
affected
9.14.3
affected
9.12.4.26
affected
9.16.1.28
affected
9.14.3.1
affected
9.12.4.29
affected
9.14.3.9
affected
9.16.2
affected
9.12.4.30
affected
9.16.2.3
affected
9.8.4.40
affected
9.14.3.11
affected
9.15.1.17
affected
9.12.4.35
affected
9.8.4.41
affected
9.15.1.1
affected
9.14.3.13
affected
9.16.2.7
affected
9.12.4.37
affected
9.14.3.15
affected
9.17.1
affected
9.16.2.11
affected
9.14.3.18
affected
9.16.2.13
affected
9.12.4.39
affected
9.12.4.38
affected
9.8.4.43
affected
9.14.4
affected
9.16.2.14
affected
9.17.1.7
affected
9.12.4.40
affected
9.15.1.21
affected
9.16.3.3
affected
9.14.4.6
affected
9.16.3
affected
9.16.3.14
affected
9.17.1.9
affected
9.14.4.7
affected
9.12.4.41
affected
9.17.1.10
affected
9.8.4.44
affected
9.18.1
affected
9.12.4.47
affected
9.14.4.12
affected
9.16.3.15
affected
9.18.1.3
affected
9.17.1.11
affected
9.12.4.48
affected
9.14.4.13
affected
9.18.2
affected
9.16.3.19
affected
9.17.1.13
affected
9.12.4.50
affected
9.14.4.14
affected
9.17.1.15
affected
9.8.4.45
affected
9.12.4.52
affected
9.14.4.15
affected
9.16.3.23
affected
9.18.2.5
affected
9.16.4
affected
9.12.4.54
affected
9.14.4.17
affected
9.8.4.46
affected
9.17.1.20
affected
9.18.2.7
affected
9.19.1
affected
9.16.4.9
affected
9.12.4.55
affected
9.18.2.8
affected
9.8.4.48
affected
Default status
unknown
6.2.3.14
affected
6.4.0.1
affected
6.2.3.7
affected
6.2.3
affected
6.4.0.2
affected
6.2.3.9
affected
6.2.3.1
affected
6.2.3.2
affected
6.4.0.5
affected
6.2.3.10
affected
6.4.0
affected
6.4.0.3
affected
6.2.3.6
affected
6.4.0.4
affected
6.2.3.15
affected
6.2.3.5
affected
6.2.3.4
affected
6.2.3.3
affected
6.2.3.8
affected
6.4.0.6
affected
6.2.3.11
affected
6.2.3.12
affected
6.2.3.13
affected
6.4.0.7
affected
6.4.0.8
affected
6.6.0
affected
6.4.0.9
affected
6.2.3.16
affected
6.6.0.1
affected
6.6.1
affected
6.4.0.10
affected
6.7.0
affected
6.4.0.11
affected
6.6.3
affected
6.7.0.1
affected
6.6.4
affected
6.4.0.12
affected
6.7.0.2
affected
7.0.0
affected
6.2.3.17
affected
7.0.0.1
affected
6.6.5
affected
7.0.1
affected
7.1.0
affected
6.4.0.13
affected
6.6.5.1
affected
6.2.3.18
affected
7.0.1.1
affected
6.7.0.3
affected
6.4.0.14
affected
7.1.0.1
affected
6.6.5.2
affected
7.0.2
affected
6.4.0.15
affected
7.2.0
affected
7.0.2.1
affected
7.0.3
affected
6.6.7
affected
7.1.0.2
affected
7.2.0.1
affected
7.0.4
affected
7.2.1
affected
7.0.5
affected
6.4.0.16
affected
7.3.0
affected
7.2.2
affected
7.2.3
affected
6.6.7.1
affected
7.3.1
affected
7.1.0.3
affected
7.3.1.1
affected
6.6.7.2
affected
7.3.1.2
affected
References
sec.cloudapps.cisco.com/...sco-sa-asaftd-acl-bypass-VvnLNKqf (cisco-sa-asaftd-acl-bypass-VvnLNKqf)
sec.cloudapps.cisco.com/...dvisory/cisco-sa-fmc-xss-M446vbEO
sec.cloudapps.cisco.com/...enter/viewErp.x?alertId=ERP-75300 (Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication)
cve.org (CVE-2024-20299)
nvd.nist.gov (CVE-2024-20299)
Download JSON