CVE-2024-20353
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Lifecycle Timeline
4Description
A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.
Analysis
Cisco ASA and FTD management and VPN web servers contain a vulnerability causing device reload through incomplete error checking, exploited alongside CVE-2024-20359 by state-sponsored actors in the 'ArcaneDoor' campaign.
Technical Context
The CWE-835 infinite loop vulnerability in ASA/FTD's web server request handling allows specially crafted requests to trigger incomplete error processing, causing the device to reload. This DoS capability was used as part of a larger campaign involving device compromise.
Affected Products
['Cisco ASA Software', 'Cisco FTD Software']
Remediation
Apply Cisco security updates. Run Cisco's Integrity Checker to verify ASA firmware. Check for ArcaneDoor indicators of compromise. Implement out-of-band management for ASA devices.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today