#VU98031 Authorization bypass through user-controlled key in Cisco Systems, Inc products - CVE-2024-20513

 

#VU98031 Authorization bypass through user-controlled key in Cisco Systems, Inc products - CVE-2024-20513

Published: October 4, 2024


Vulnerability identifier: #VU98031
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2024-20513
CWE-ID: CWE-639
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Meraki MX
Cisco Meraki MX67W
Cisco Meraki MX68CW
Cisco Meraki MX68W
Cisco Meraki MX64
Cisco Meraki MX64W
Cisco Meraki MX65
Cisco Meraki MX65W
Cisco Meraki MX67
Cisco Meraki MX67C
Cisco Meraki MX68
Cisco Meraki MX75
Cisco Meraki MX84
Cisco Meraki MX85
Cisco Meraki MX95
Cisco Meraki MX100
Cisco Meraki MX105
Cisco Meraki MX250
Cisco Meraki MX400
Cisco Meraki MX450
Cisco Meraki MX600
Cisco Meraki vMX
Cisco Meraki Z3
Cisco Meraki Z3Z3C
Cisco Meraki Z3Z4
Cisco Meraki Z3Z4C
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient entropy for handlers that are used during SSL VPN session establishment in the Cisco AnyConnect VPN server. A remote attacker can send a specially crafted HTTPS request using the brute-forced or predicted session handler and cause a denial of service condition on the target system.


Remediation

Install updates from vendor's website.

External links