CVE-2024-20426
Nov. 5, 2024, 7:43 p.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
cisco |
|
|
Description
A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol for VPN termination of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Weaknesses
CWE-476
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
CWE ID: 476Date
Published: Oct. 23, 2024, 6:15 p.m.
Last Modified: Nov. 5, 2024, 7:43 p.m.
Status : Analyzed
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
ykramarz@cisco.com
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
o | cisco | adaptive_security_appliance_software | 9.18.1 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.1.3 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.2 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.2.5 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.2.7 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.2.8 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.3 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.3.39 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.3.46 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.3.53 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.3.55 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.3.56 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.4 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.4.5 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.4.8 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.4.22 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.4.24 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.18.4.29 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.5 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.9 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.12 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.18 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.22 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.24 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.27 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.28 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.19.1.31 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.20.1 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.20.1.5 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.20.2 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.20.2.10 | / | / | / | / | / | / | / |
o | cisco | adaptive_security_appliance_software | 9.20.2.21 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.0 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.0.1 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.1 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.2 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.3 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.4 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.4.1 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.5 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.5.1 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.5.2 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.6 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.7 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.8 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.2.8.1 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.3.0 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.3.1 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.3.1.1 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.3.1.2 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.4.0 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.4.1 | / | / | / | / | / | / | / |
a | cisco | firepower_threat_defense_software | 7.4.1.1 | / | / | / | / | / | / | / |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
Exploitability Score
Impact Score
Base Severity
HIGHCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H