Cisco ASA SSH RCE: Authenticated User Gains Root Privileges
CVE-2024-20329 Published on October 23, 2024
Cisco Adaptive Security Appliance Software Remote Command Injection Vulnerability
A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to execute operating system commands as root.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by submitting crafted input when executing remote CLI commands over SSH. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system.
Vulnerability Analysis
CVE-2024-20329 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
Improper Neutralization of Expression/Command Delimiters
The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as expression or command delimiters when they are sent to a downstream component. As data is parsed, an injected/absent/malformed delimiter may cause the process to take unexpected actions.
Products Associated with CVE-2024-20329
stack.watch emails you whenever new vulnerabilities are published in Cisco Adaptive Security Appliance Software or Cisco Adaptive Security Appliance. Just hit a watch button to start following.
Affected Versions
Cisco Adaptive Security Appliance (ASA) Software:- Version 9.17.1 is affected.
- Version 9.17.1.7 is affected.
- Version 9.17.1.9 is affected.
- Version 9.17.1.10 is affected.
- Version 9.18.1 is affected.
- Version 9.18.1.3 is affected.
- Version 9.17.1.11 is affected.
- Version 9.18.2 is affected.
- Version 9.17.1.13 is affected.
- Version 9.17.1.15 is affected.
- Version 9.18.2.5 is affected.
- Version 9.17.1.20 is affected.
- Version 9.18.2.7 is affected.
- Version 9.19.1 is affected.
- Version 9.18.2.8 is affected.
- Version 9.18.3 is affected.
- Version 9.19.1.5 is affected.
- Version 9.17.1.30 is affected.
- Version 9.19.1.9 is affected.
- Version 9.18.3.39 is affected.
- Version 9.19.1.12 is affected.
- Version 9.18.3.46 is affected.
- Version 9.19.1.18 is affected.
- Version 9.18.3.53 is affected.
- Version 9.18.3.55 is affected.
- Version 9.17.1.33 is affected.
- Version 9.18.3.56 is affected.
- Version 9.17.1, <= 9.17.1.33 is affected.
- Version 9.18.1 is affected.
- Version 9.18.1.3 is affected.
- Version 9.18.2, <= 9.18.2.8 is affected.
- Version 9.18.3, <= 9.18.3.56 is affected.
- Version 9.19.1, <= 9.19.1.18 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.