CVE-2024-20359
Cisco
CVE-2024-20359 is a critical vulnerability in Cisco ASA and FTD software allowing for arbitrary code execution. This vulnerability arises from improper file validation when read from system flash memory, potentially enabling a local attacker with administrator privileges to execute code with root privileges. Despite a CVSS score of 6, the SOCRadar Vulnerability Risk Score (SVRS) is 60, highlighting a moderate risk. Successful exploitation involves copying a crafted file to the device's disk0: file system, enabling the attacker to execute arbitrary code after the device reloads, potentially altering system behavior persistently. Due to the potential for code injection to survive reboots, Cisco has escalated the security impact rating to High, and active exploits are available making immediate patching essential.
Description
CVE-2024-20359 is a critical vulnerability in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software that allows an authenticated, local attacker to execute arbitrary code with root-level privileges. This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior.
Key Insights
- The SVRS of 52 indicates a moderate risk, but the vulnerability is still considered critical due to its potential impact.
- Active exploits have been published, and the vulnerability is being actively exploited in the wild.
- The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
Mitigation Strategies
- Update to the latest version of Cisco ASA Software or Cisco Firepower Threat Defense (FTD) Software.
- Disable the legacy VPN client and plug-in preloading capability.
- Restrict access to the disk0: file system.
- Monitor for suspicious activity and take appropriate action.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.