CVE-2024-20268
Cisco Adaptive Security Appliance (ASA) vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2024-20268) has been identified in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software. The vulnerability was discovered by Sanmith Prakash of Cisco during internal security testing and was disclosed on October 23, 2024. This vulnerability affects all versions of SNMP (versions 1, 2c, and 3) in Cisco ASA and FTD Software when remote SNMP management is enabled (Cisco Advisory).

Technical details

The vulnerability stems from insufficient input validation of SNMP packets. It has been assigned a CVSS base score of 7.7 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H. To exploit this vulnerability, an attacker needs valid SNMP community string credentials for SNMPv2c or earlier versions, or valid SNMPv3 user credentials. The vulnerability can be exploited using either IPv4 or IPv6 (Cisco Advisory).

Impact

A successful exploitation of this vulnerability could allow an authenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This impact affects the availability of network security services provided by the ASA and FTD devices (Cisco Advisory).

Mitigation and workarounds

Cisco has released software updates that address this vulnerability. There are no workarounds available that directly address the vulnerability. However, administrators can implement two mitigation strategies: 1) disable SNMP if it's not necessary on the device, or 2) reduce the attack surface by only allowing SNMP connections from trusted SNMP monitoring hosts. Customers with service contracts can obtain security fixes through their usual update channels (Cisco Advisory).

Additional resources


SourceThis report was generated using AI

Related Cisco Adaptive Security Appliance (ASA) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20333CRITICAL9.9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
YesYesSep 25, 2025
CVE-2025-20363CRITICAL9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoYesSep 25, 2025
CVE-2025-20362HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
YesYesSep 25, 2025
CVE-2025-20263HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoYesAug 14, 2025
CVE-2025-20254MEDIUM5.8
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoYesAug 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management