Cisco ASA, FTD Software Under Active VPN Exploitation

Cisco ASA, FTD Software Under Active VPN Exploitation

October 24, 2024 at 11:59AM

Cisco has quickly released a patch for a medium-severity DoS vulnerability (CVE-2024-20481) in its VPN software, which is actively exploited. The flaw allows attackers to overload the system with authentication requests. Cisco advises updating software and implementing security measures to mitigate risks, as no workarounds are available.

### Meeting Takeaways

1. **Vulnerability Overview**:
– Cisco is addressing a medium-severity DoS vulnerability (CVE-2024-20481, CVSS 5.8) affecting its VPN services, specifically the Remote Access VPN (RAVPN) in Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) software.

2. **Impact of the Vulnerability**:
– Exploitation could allow unauthenticated, remote attackers to launch a DoS attack, potentially leading to service disruptions in the RAVPN.
– Affected devices might require reloading to restore RAVPN services, while other non-VPN services remain unaffected.

3. **Exploitation Method**:
– Attackers may perform resource exhaustion attacks by sending a high volume of VPN authentication requests, similar to brute-force or password-spray attacks.

4. **Mitigation Steps**:
– Cisco has rolled out software updates to address this vulnerability.
– No alternative workarounds exist beyond applying these updates.

5. **Security Recommendations**:
– Cisco advises users to implement measures to mitigate the risk of password-spray attacks:
– Enable logging on VPN services.
– Configure threat detection for remote access VPN services.
– Apply hardening measures to enhance security.
– Manually block unauthorized connection attempts.

### Action Items:
– Review and apply the latest updates from Cisco.
– Implement recommended security measures to protect against potential attacks.

Full Article