This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Meraki Mx100
Subscribe
Meraki Mx100 Firmware
Subscribe
Meraki Mx105
Subscribe
Meraki Mx105 Firmware
Subscribe
Meraki Mx250
Subscribe
Meraki Mx250 Firmware
Subscribe
Meraki Mx400
Subscribe
Meraki Mx400 Firmware
Subscribe
Meraki Mx450
Subscribe
Meraki Mx450 Firmware
Subscribe
Meraki Mx600
Subscribe
Meraki Mx600 Firmware
Subscribe
Meraki Mx64
Subscribe
Meraki Mx64 Firmware
Subscribe
Meraki Mx64w
Subscribe
Meraki Mx64w Firmware
Subscribe
Meraki Mx65
Subscribe
Meraki Mx65 Firmware
Subscribe
Meraki Mx65w
Subscribe
Meraki Mx65w Firmware
Subscribe
Meraki Mx67
Subscribe
Meraki Mx67 Firmware
Subscribe
Meraki Mx67c
Subscribe
Meraki Mx67c Firmware
Subscribe
Meraki Mx67w
Subscribe
Meraki Mx67w Firmware
Subscribe
Meraki Mx68
Subscribe
Meraki Mx68 Firmware
Subscribe
Meraki Mx68cw
Subscribe
Meraki Mx68cw Firmware
Subscribe
Meraki Mx68w
Subscribe
Meraki Mx68w Firmware
Subscribe
Meraki Mx75
Subscribe
Meraki Mx75 Firmware
Subscribe
Meraki Mx84
Subscribe
Meraki Mx84 Firmware
Subscribe
Meraki Mx85
Subscribe
Meraki Mx85 Firmware
Subscribe
Meraki Mx95
Subscribe
Meraki Mx95 Firmware
Subscribe
Meraki Vmx
Subscribe
Meraki Vmx Firmware
Subscribe
Meraki Z3
Subscribe
Meraki Z3 Firmware
Subscribe
Meraki Z3c
Subscribe
Meraki Z3c Firmware
Subscribe
Meraki Z4
Subscribe
Meraki Z4 Firmware
Subscribe
Meraki Z4c
Subscribe
Meraki Z4c Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18228 | A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device. This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Targeted Denial of Service Vulnerability |
Wed, 04 Jun 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device. This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate. | A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device. This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate. |
Tue, 08 Oct 2024 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco meraki Mx100 Cisco meraki Mx100 Firmware Cisco meraki Mx105 Cisco meraki Mx105 Firmware Cisco meraki Mx250 Cisco meraki Mx250 Firmware Cisco meraki Mx400 Cisco meraki Mx400 Firmware Cisco meraki Mx450 Cisco meraki Mx450 Firmware Cisco meraki Mx600 Cisco meraki Mx600 Firmware Cisco meraki Mx64 Cisco meraki Mx64 Firmware Cisco meraki Mx64w Cisco meraki Mx64w Firmware Cisco meraki Mx65 Cisco meraki Mx65 Firmware Cisco meraki Mx65w Cisco meraki Mx65w Firmware Cisco meraki Mx67 Cisco meraki Mx67 Firmware Cisco meraki Mx67c Cisco meraki Mx67c Firmware Cisco meraki Mx67w Cisco meraki Mx67w Firmware Cisco meraki Mx68 Cisco meraki Mx68 Firmware Cisco meraki Mx68cw Cisco meraki Mx68cw Firmware Cisco meraki Mx68w Cisco meraki Mx68w Firmware Cisco meraki Mx75 Cisco meraki Mx75 Firmware Cisco meraki Mx84 Cisco meraki Mx84 Firmware Cisco meraki Mx85 Cisco meraki Mx85 Firmware Cisco meraki Mx95 Cisco meraki Mx95 Firmware Cisco meraki Vmx Cisco meraki Vmx Firmware Cisco meraki Z3 Cisco meraki Z3 Firmware Cisco meraki Z3c Cisco meraki Z3c Firmware Cisco meraki Z4 Cisco meraki Z4 Firmware Cisco meraki Z4c Cisco meraki Z4c Firmware |
|
| CPEs | cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco
Cisco meraki Mx100 Cisco meraki Mx100 Firmware Cisco meraki Mx105 Cisco meraki Mx105 Firmware Cisco meraki Mx250 Cisco meraki Mx250 Firmware Cisco meraki Mx400 Cisco meraki Mx400 Firmware Cisco meraki Mx450 Cisco meraki Mx450 Firmware Cisco meraki Mx600 Cisco meraki Mx600 Firmware Cisco meraki Mx64 Cisco meraki Mx64 Firmware Cisco meraki Mx64w Cisco meraki Mx64w Firmware Cisco meraki Mx65 Cisco meraki Mx65 Firmware Cisco meraki Mx65w Cisco meraki Mx65w Firmware Cisco meraki Mx67 Cisco meraki Mx67 Firmware Cisco meraki Mx67c Cisco meraki Mx67c Firmware Cisco meraki Mx67w Cisco meraki Mx67w Firmware Cisco meraki Mx68 Cisco meraki Mx68 Firmware Cisco meraki Mx68cw Cisco meraki Mx68cw Firmware Cisco meraki Mx68w Cisco meraki Mx68w Firmware Cisco meraki Mx75 Cisco meraki Mx75 Firmware Cisco meraki Mx84 Cisco meraki Mx84 Firmware Cisco meraki Mx85 Cisco meraki Mx85 Firmware Cisco meraki Mx95 Cisco meraki Mx95 Firmware Cisco meraki Vmx Cisco meraki Vmx Firmware Cisco meraki Z3 Cisco meraki Z3 Firmware Cisco meraki Z3c Cisco meraki Z3c Firmware Cisco meraki Z4 Cisco meraki Z4 Firmware Cisco meraki Z4c Cisco meraki Z4c Firmware |
Wed, 02 Oct 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Oct 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device. This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate. | |
| Title | Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Targeted Denial of Service Vulnerability | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-06-04T20:19:53.000Z
Reserved: 2023-11-08T15:08:07.689Z
Link: CVE-2024-20513
Updated: 2024-10-02T19:48:10.903Z
Status : Modified
Published: 2024-10-02T19:15:15.210
Modified: 2025-06-04T21:15:37.183
Link: CVE-2024-20513
No data.
OpenCVE Enrichment
No data.
EUVD