Threat actors could exploit the vulnerability, which stems from resource exhaustion, to facilitate a denial-of-service condition in impacted devices’ RAVPN service, said Cisco, who also recommended logging activation, threat detection configuration for remote access VPNs, AAA authentication deactivation, and manual blocking of unauthorized connection attempts to mitigate password spraying attacks. Also addressed by Cisco were a trio of critical issues in ASA, Secure Firewall Management Center Software, and FTD Software, tracked as CVE-2024-20329, CVE-2024-20424, and CVE-2024-20412.
Source: SC Magazine