CVE-2024-20353

HIGH
2024-04-24 [email protected]
8.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:20 vuln.today
Added to CISA KEV
Oct 28, 2025 - 13:59 cisa
CISA KEV
PoC Detected
Oct 28, 2025 - 13:59 vuln.today
Public exploit code
CVE Published
Apr 24, 2024 - 19:15 nvd
HIGH 8.6

Description

A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.

Analysis

Cisco ASA and FTD management and VPN web servers contain a vulnerability causing device reload through incomplete error checking, exploited alongside CVE-2024-20359 by state-sponsored actors in the 'ArcaneDoor' campaign.

Technical Context

The CWE-835 infinite loop vulnerability in ASA/FTD's web server request handling allows specially crafted requests to trigger incomplete error processing, causing the device to reload. This DoS capability was used as part of a larger campaign involving device compromise.

Affected Products

['Cisco ASA Software', 'Cisco FTD Software']

Remediation

Apply Cisco security updates. Run Cisco's Integrity Checker to verify ASA firmware. Check for ArcaneDoor indicators of compromise. Implement out-of-band management for ASA devices.

Priority Score

147
Low Medium High Critical
KEV: +50
EPSS: +24.4
CVSS: +43
POC: +20

Share

CVE-2024-20353 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy