Cisco Meraki 16.2 / 17 / 18.1 < 18.1.07.13 / 18.2 < 18.2.11.3 DoS (cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X)

medium Nessus Plugin ID 241197

Synopsis

The remote Cisco Meraki device is potentially missing one or more security-related updates.

Description

The version of the remote Cisco Meraki device is 16.2, 17, 18.1 prior to 18.1.07.13, or 18.2 prior to 18.2.11.3. It is, therefore, potentially affected by a denial of service vulnerability as referenced in the cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X advisory:

- A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device. This vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device. (CVE-2024-20509)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Cisco Meraki version 18.1.07.13 or 18.2.11.3 or later.

See Also

http://www.nessus.org/u?7cdd30c1

Plugin Details

Severity: Medium

ID: 241197

File Name: cisco_meraki_cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X.nasl

Version: 1.2

Type: remote

Family: CISCO

Published: 7/2/2025

Updated: 7/2/2025

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2024-20509

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:/h:cisco:meraki

Required KB Items: installed_sw/Cisco Meraki, Settings/ParanoidReport

Patch Publication Date: 10/2/2024

Vulnerability Publication Date: 10/2/2024

Reference Information

CVE: CVE-2024-20509