Description

A vulnerability in the VPN and management web servers of the Cisco Adaptive Security Virtual Appliance (ASAv) and Cisco Secure Firewall Threat Defense Virtual (FTDv), formerly Cisco Firepower Threat Defense Virtual, platforms could allow an unauthenticated, remote attacker to cause the virtual devices to run out of system memory, which could cause SSL VPN connection processing to slow down and eventually cease all together. This vulnerability is due to a lack of proper memory management for new incoming SSL/TLS connections on the virtual platforms. An attacker could exploit this vulnerability by sending a large number of new incoming SSL/TLS connections to the targeted virtual platform. A successful exploit could allow the attacker to deplete system memory, resulting in a denial of service (DoS) condition. The memory could be reclaimed slowly if the attack traffic is stopped, but a manual reload may be required to restore operations quickly.

INFO

Published Date :

2024-10-23T17:07:17.073Z

Last Modified :

2024-10-24T17:30:13.136Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2024-20260 vulnerability.

Vendors Products
Cisco
  • Adaptive Security Appliance Software
  • Firepower Threat Defense Software
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-20260.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact