By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Cisco fixes VPN DoS flaw discovered in password spray attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Cisco fixes VPN DoS flaw discovered in password spray attacks
Tech News

Cisco fixes VPN DoS flaw discovered in password spray attacks

By admin 6 Min Read
Share
SHARE

Cisco fixed a denial of service flaw in its Cisco ASA and Firepower Threat Defense (FTD) software, which was discovered during large-scale brute force attacks against Cisco VPN devices in April.

The flaw is tracked as CVE-2024-20481 and impacts all versions of Cisco ASA and Cisco FTD up until the latest versions of the software.

“A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the RAVPN service,” reads the CVE-2024-20481 security advisory.

“This vulnerability is due to resource exhaustion. An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device. A successful exploit could allow the attacker to exhaust resources, resulting in a DoS of the RAVPN service on the affected device.”

Cisco says that once this DDoS attack impacts a device, a reload may be required to restore RAVPN services.

While the Cisco Product Security Incident Response Team (PSIRT) says they are aware of the active exploitation of this vulnerability, it was not used to target Cisco ASA devices in DoS attacks.

Instead, the flaw was discovered as part of large-scale brute-force password attacks in April against VPN services on a wide variety of networking hardware, including:

  • Cisco Secure Firewall VPN
  • Checkpoint VPN
  • Fortinet VPN
  • SonicWall VPN
  • RD Web Services
  • Miktrotik
  • Draytek
  • Ubiquiti

These attacks were designed to harvest valid VPN credentials for corporate networks, which can then be sold on dark web markets, to ransomware gangs for initial access, or used to breach networks in data-theft attacks.

However, due to the large number of sequential and rapid authentication requests made against devices, the attackers unwittingly used up the resources on the device, causing a denial of service state on the Cisco ASA and FTD devices.

The bug is classified as a CWE-772 vulnerability, which indicates that the software was not properly freeing allocated resources, such as memory, during VPN authentication attempts.

Cisco says that this flaw can only be exploited if the RAVPN service is enabled.

Admins can check if SSL VPN is enabled on a device by issuing the following command:

firewall# show running-config webvpn | include ^ enable

If there is no output, then the RAVPN service is not enabled.

Other Cisco vulnerabilities 

Cisco has also issued 37 security advisories for 42 vulnerabilities on various of its products, including three critical-severity flaws impacting Firepower Threat Defense (FTD), Secure Firewall Management Center (FMC), and Adaptive Security Appliance (ASA).

Although none of the flaws have been observed to be actively exploited in the wild, their nature and severity should warrant immediate patching by impacted system admins.

A summary of the flaws is given below:

  • CVE-2024-20424: Command injection flaw in the web-based management interface of Cisco FMC software, caused by improper validation of HTTP requests. It allows authenticated remote attackers with at least ‘Security Analyst’ privileges to execute arbitrary commands on the underlying OS with root privileges. (CVSS v3.1 score: 9.9)
  • CVE-2024-20329: Remote command injection vulnerability in Cisco ASA caused by insufficient user input validation in remote CLI commands over SSH. It allows authenticated remote attackers to execute root-level OS commands. (CVSS v3.1 score: 9.9)
  • CVE-2024-20412: Static credentials in Firepower 1000, 2100, 3100, and 4200 Series devices, allowing local attackers unrestricted access to sensitive data, as well as configuration modification. (CVSS v3.1 score: 9.3)

CVE-2024-20424 impacts any Cisco product running a vulnerable version of FMC regardless of device configuration. The vendor has given no workarounds for this flaw.

CVE-2024-20329 impacts ASA releases that have the CiscoSSH stack enabled and SSH access allowed on at least one interface.

A proposed workaround for this flaw is to disable the vulnerable CiscoSSH stack and enable the native SSH stack by using the command: "no ssh stack ciscossh"

This will disconnect active SSH sessions, and changes must be saved to make it persistent across reboots.

CVE-2024-20412 impacts FTD Software versions 7.1 through 7.4 with a VDB release of 387 or earlier on Firepower 1000, 2100, 3100, and 4200 Series devices.

Cisco says there’s a workaround for this problem available to impacted clients through its Technical Assistance Center.

For CVE-2024-20412, the software vendor has also included signs of exploitation in the advisory to help system administrators detect malicious activity.

It is recommended to use this command to check for use of static credentials: 

zgrep -E "Accepted password for (csm_processes|report|sftop10user|Sourcefire|SRU)"/ngfw/var/log/messages*

If any successful login attempts are listed, it might be an indication of exploitation. If no output is returned, the default credentials weren’t used during the log retention period.

No exploitation detection advice was provided for CVE-2024-20424 and CVE-2024-20329, but looking at the logs for unusual/abnormal events is always a solid method for finding suspicious activity.

Updates for all three of the flaws are available through the Cisco Software Checker tool.

You Might Also Like

Google November Pixel Drop Adds 7 New Features

WIRED Roundup: Fandom in Politics, Zuckerberg’s Illegal School, and Nepal’s Discord Revolution

New Dungarvan & West Waterford Gift Card launched

Gemini 3 vs GPT-5 Pro: Coding, Math, Benchmarks & Creative Tests

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

TAGGED: Cisco, Command Injection, Hardcoded Password, SSL VPN, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article EU green energy exports grow on all fronts but trade-off remains negative
Next Article ‘Churring’ call of nightjar confirms its presence in Ireland
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Aave Labs Announces App Release On Apple’s Platform: Features And Expectations
Crypto
Shelters plea for Gazans as winter rains raise fears of more disease and death
World News
Ripple price forecast: Will XRP reclaim $2.5 soon?
Crypto
Google November Pixel Drop Adds 7 New Features
Tech News
EU countries should have ‘multiple’ security guarantees beyond Article 5, Kubilius says
World News
Trump promises to send $2,000 tariff dividend checks ‘probably the middle of next year, a little bit later than that’
Business
Red Dead Redemption is Getting Another Re-Release, But What About Red Dead Redemption 2?
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Aave Labs Announces App Release On Apple’s Platform: Features And Expectations

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Aave Labs Announces App Release On Apple’s Platform: Features And Expectations
November 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?