Skip to main content

Cisco Releases October 2024 ASA, FMC, and FTD Software Security Advisory Bundled Publication

35 advisories are included in the semi-annual Cisco Adaptive Security Appliance Software (ASA), Firepower Management Center (FMC) Software, and Firepower Threat Defense (FTD) Software Security Advisory bundled publication

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

35 advisories are included in the semi-annual Cisco Adaptive Security Appliance Software (ASA), Firepower Management Center (FMC) Software, and Firepower Threat Defense (FTD) Software Security Advisory bundled publication


Threat details

Cisco Software Checker

To help customers determine their exposure to vulnerabilities in Cisco ASA, FMC, and FTD Software, Cisco provides the Cisco Software Checker. This tool identifies any Cisco security advisories that impact a specific software release and the earliest release that fixes the vulnerabilities.


Introduction

Cisco has released 35 security advisories that cover 51 vulnerabilities in its semi-annual bundle of Cisco Adaptive Security Appliance Software (ASA), Firepower Management Center (FMC) Software, and Firepower Threat Defense (FTD) Software Advisories.

The bundled publication includes 3 advisories with a critical security impact rating, 11 with high security impact, 20 advisories with medium impact, and 1 advisory rated as informational. Of these advisories, special attention should be given to the following two medium impact advisories, listed in the following section due to exploitation or availability of exploit code.

In addition, three critical security impact advisories also warrant close inspection. Two vulnerabilities address command injection vulnerabilities, which if exploited, could allow an authenticated, remote attacker to execute commands as root. The third critical advisory concerns a static credential vulnerability that could allow an attacker to access the affected system and retrieve sensitive information, perform limited troubleshooting actions, modify some configuration options, or render the device unable to boot to the operating system, requiring a re-image of the device.

  • cisco-sa-asa-ssh-rce-gRAuPEUF  | Cisco Adaptive Security Appliance Software SSH Remote Command Injection Vulnerability - CVE-2024-20329
  • cisco-sa-fmc-cmd-inj-v3AWDqN7 | Cisco Secure Firewall Management Center Software Command Injection Vulnerability - CVE-2024-20424
  • cisco-sa-ftd-statcred-dFC8tXT5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability - CVE-2024-20412

Much more information about the other advisories not described in this cyber alert can be found in the October 2024 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.


Exploitation in the wild and PoC exploit code available

  • Exploited in the wild:
    Outlined in medium impact advisory ID cisco-sa-asaftd-bf-dos-vDZhLqrW, a brute force denial-of-service (DoS) vulnerability known as CVE-2024-20481 could be exploited by an unauthenticated, remote attacker by sending a large number of VPN authentication requests to an affected device. A successful exploit could allow an attacker to exhaust resources, resulting in a DoS of the Remote Access VPN service on the affected device. The advisory lists possible indicators of compromise (IoCs) and mitigation.
     
  • Proof-of-concept exploit code available:
    Medium impact advisory ID cisco-sa-fmc-xss-infodisc-RL4mJFer contains three vulnerabilities, two that address cross-site scripting (XSS) and one that could lead to information disclosure. Cisco is not aware of any malicious use of the vulnerabilities, but public proof-of-concept exploit code is available. The NHS England National CSOC consider exploitation of these vulnerabilities more likely.

Exploitation CVE-2024-20481 and proof-of-concept code for three other vulnerabilities

The NHS England National CSOC consider the exploitation of CVE-2024-20481 highly likely to continue.

With PoC exploit code available, exploitation of vulnerabilities CVE-2024-20377, CVE-2024-20387, and CVE-2024-20388 is considered more likely.


Remediation advice

Affected organisations are encouraged to review October 2024 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication and its linked advisories and apply any relevant security updates.

Additional mitigation guidance is available in Recommendations Against Password Spray Attacks Aimed at Remote Access VPN Services in Secure Firewall TechNote.



CVE Vulnerabilities

Last edited: 24 October 2024 4:00 pm