Blog
Share This Post
[ad_1]

Updates have been issued by Cisco to fix a medium-severity flaw in its Adaptive Security Appliance’s and Firepower Threat Defense Software’s Remote Access VPN service, tracked as CVE-2024-20481, which has already been leveraged in ongoing attacks, according to The Hacker News.
Threat actors could exploit the vulnerability, which stems from resource exhaustion, to facilitate a denial-of-service condition in impacted devices’ RAVPN service, said Cisco, who also recommended logging activation, threat detection configuration for remote access VPNs, AAA authentication deactivation, and manual blocking of unauthorized connection attempts to mitigate password spraying attacks. Also addressed by Cisco were a trio of critical issues in ASA, Secure Firewall Management Center Software, and FTD Software, tracked as CVE-2024-20329, CVE-2024-20424, and CVE-2024-20412. Such a development comes months after brute-force intrusions against VPN and SSH services, as well as web app authentication interfaces, were reported by Cisco Talos researchers to have surged since March. “These attacks all appear to be originating from TOR exit nodes and a range of other anonymizing tunnels and proxies,” said researchers of the intrusions.
[ad_2]
Source link
Subscribe To Our Newsletter
Get updates and learn from the best
More To Explore
US Charges Five People Over North Korean IT Worker Scheme
[ad_1] The US has announced charges against five individuals involved in a fake IT workers scheme to funnel funds to
In Other News: VPN Supply Chain Attack, PayPal $2M Settlement, RAT Builder Hacks Script Kiddies
[ad_1] Noteworthy stories that might have slipped under the radar: Korean VPN supply chain attack, PayPal settles with New York