Home

Description

A vulnerability in the AnyConnect firewall for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should have been denied to flow through an affected device. This vulnerability is due to a logic error in populating group ACLs when an AnyConnect client establishes a new session toward an affected device. An attacker could exploit this vulnerability by establishing an AnyConnect connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.

PUBLISHED Reserved 2023-11-08 | Published 2024-10-23 | Updated 2024-10-24 | Assigner cisco




MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

Problem types

Authentication Bypass by Spoofing

Product status

Default status
unknown

9.12.3
affected

9.8.3
affected

9.12.1
affected

9.8.1
affected

9.12.2
affected

9.8.2.45
affected

9.8.2
affected

9.8.4
affected

9.14.1
affected

9.12.4
affected

9.8.2.26
affected

9.8.2.24
affected

9.8.2.15
affected

9.8.2.14
affected

9.8.2.35
affected

9.8.2.20
affected

9.8.2.8
affected

9.8.2.17
affected

9.8.2.28
affected

9.8.2.33
affected

9.8.2.38
affected

9.8.4.25
affected

9.12.3.2
affected

9.12.3.7
affected

9.8.3.18
affected

9.8.3.14
affected

9.8.4.15
affected

9.8.4.8
affected

9.8.1.7
affected

9.8.3.29
affected

9.14.1.10
affected

9.12.2.5
affected

9.8.4.22
affected

9.12.3.12
affected

9.8.4.7
affected

9.8.4.17
affected

9.8.3.16
affected

9.8.4.20
affected

9.8.3.11
affected

9.12.1.3
affected

9.8.4.3
affected

9.12.2.4
affected

9.8.4.12
affected

9.12.1.2
affected

9.8.3.26
affected

9.8.1.5
affected

9.12.2.9
affected

9.12.3.9
affected

9.8.3.21
affected

9.8.4.10
affected

9.12.2.1
affected

9.12.4.2
affected

9.14.1.6
affected

9.8.3.8
affected

9.14.1.15
affected

9.14.1.19
affected

9.8.4.26
affected

9.12.4.4
affected

9.14.1.30
affected

9.8.4.29
affected

9.12.4.7
affected

9.15.1
affected

9.14.2
affected

9.12.4.8
affected

9.8.4.32
affected

9.12.4.10
affected

9.14.2.4
affected

9.15.1.7
affected

9.14.2.8
affected

9.12.4.13
affected

9.8.4.33
affected

9.15.1.10
affected

9.14.2.13
affected

9.8.4.34
affected

9.12.4.18
affected

9.15.1.15
affected

9.8.4.35
affected

9.14.2.15
affected

9.12.4.24
affected

9.16.1
affected

9.15.1.16
affected

9.8.4.39
affected

9.14.3
affected

9.12.4.26
affected

9.16.1.28
affected

9.14.3.1
affected

9.12.4.29
affected

9.14.3.9
affected

9.16.2
affected

9.12.4.30
affected

9.16.2.3
affected

9.8.4.40
affected

9.14.3.11
affected

9.15.1.17
affected

9.12.4.35
affected

9.8.4.41
affected

9.15.1.1
affected

9.14.3.13
affected

9.16.2.7
affected

9.12.4.37
affected

9.14.3.15
affected

9.17.1
affected

9.16.2.11
affected

9.14.3.18
affected

9.16.2.13
affected

9.12.4.39
affected

9.12.4.38
affected

9.8.4.43
affected

9.14.4
affected

9.16.2.14
affected

9.17.1.7
affected

9.12.4.40
affected

9.15.1.21
affected

9.16.3.3
affected

9.14.4.6
affected

9.16.3
affected

9.16.3.14
affected

9.17.1.9
affected

9.14.4.7
affected

9.12.4.41
affected

9.17.1.10
affected

9.8.4.44
affected

9.18.1
affected

9.12.4.47
affected

9.14.4.12
affected

9.16.3.15
affected

9.18.1.3
affected

9.17.1.11
affected

9.12.4.48
affected

9.14.4.13
affected

9.18.2
affected

9.16.3.19
affected

9.17.1.13
affected

9.12.4.50
affected

9.14.4.14
affected

9.17.1.15
affected

9.8.4.45
affected

9.12.4.52
affected

9.14.4.15
affected

9.16.3.23
affected

9.18.2.5
affected

9.16.4
affected

9.12.4.54
affected

9.14.4.17
affected

9.8.4.46
affected

9.17.1.20
affected

9.18.2.7
affected

9.19.1
affected

9.16.4.9
affected

9.12.4.55
affected

9.18.2.8
affected

9.8.4.48
affected

Default status
unknown

6.2.3.14
affected

6.4.0.1
affected

6.2.3.7
affected

6.2.3
affected

6.4.0.2
affected

6.2.3.9
affected

6.2.3.1
affected

6.2.3.2
affected

6.4.0.5
affected

6.2.3.10
affected

6.4.0
affected

6.4.0.3
affected

6.2.3.6
affected

6.4.0.4
affected

6.2.3.15
affected

6.2.3.5
affected

6.2.3.4
affected

6.2.3.3
affected

6.2.3.8
affected

6.4.0.6
affected

6.2.3.11
affected

6.2.3.12
affected

6.2.3.13
affected

6.4.0.7
affected

6.4.0.8
affected

6.6.0
affected

6.4.0.9
affected

6.2.3.16
affected

6.6.0.1
affected

6.6.1
affected

6.4.0.10
affected

6.7.0
affected

6.4.0.11
affected

6.6.3
affected

6.7.0.1
affected

6.6.4
affected

6.4.0.12
affected

6.7.0.2
affected

7.0.0
affected

6.2.3.17
affected

7.0.0.1
affected

6.6.5
affected

7.0.1
affected

7.1.0
affected

6.4.0.13
affected

6.6.5.1
affected

6.2.3.18
affected

7.0.1.1
affected

6.7.0.3
affected

6.4.0.14
affected

7.1.0.1
affected

6.6.5.2
affected

7.0.2
affected

6.4.0.15
affected

7.2.0
affected

7.0.2.1
affected

7.0.3
affected

6.6.7
affected

7.1.0.2
affected

7.2.0.1
affected

7.0.4
affected

7.2.1
affected

7.0.5
affected

6.4.0.16
affected

7.3.0
affected

7.2.2
affected

7.2.3
affected

6.6.7.1
affected

7.3.1
affected

7.1.0.3
affected

7.3.1.1
affected

6.6.7.2
affected

7.3.1.2
affected

References

sec.cloudapps.cisco.com/...sco-sa-asaftd-acl-bypass-VvnLNKqf (cisco-sa-asaftd-acl-bypass-VvnLNKqf)

sec.cloudapps.cisco.com/...dvisory/cisco-sa-fmc-xss-M446vbEO

sec.cloudapps.cisco.com/...enter/viewErp.x?alertId=ERP-75300 (Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication)

cve.org (CVE-2024-20299)

nvd.nist.gov (CVE-2024-20299)

Download JSON