CVE-2024-46655
Mié, 25/09/2024 – 18:15
CVE-2024-46655
CVE-2024-46655
Mié, 25/09/2024 – 18:15
CVE-2024-46655
CVE-2024-46489
Mié, 25/09/2024 – 18:15
CVE-2024-46489
CVE-2024-46488
Mié, 25/09/2024 – 18:15
CVE-2024-46488
CVE-2024-45750
Mié, 25/09/2024 – 18:15
CVE-2024-45750
CVE-2023-51157
Mié, 25/09/2024 – 19:15
CVE-2023-51157
CVE-2024-41708
Mié, 25/09/2024 – 17:15
CVE-2024-41708
CVE-2024-41445
Mié, 25/09/2024 – 17:15
CVE-2024-41445
CVE-2024-20510
Mié, 25/09/2024 – 17:15
CVE-2024-20510
This vulnerability is due to a logic error when activating the pre-authentication ACL that is received from the authentication, authorization, and accounting (AAA) server. An attacker could exploit this vulnerability by connecting to a wireless network that is configured for CWA and sending traffic through an affected device that should be denied by the configured ACL before user authentication. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device before the user authentication is completed, allowing the attacker to access trusted networks that the device might be protecting.
CVE-2024-20508
Mié, 25/09/2024 – 17:15
CVE-2024-20508
This vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Cisco UTD Snort IPS Engine to be dropped.
CVE-2024-20496
Mié, 25/09/2024 – 17:15
CVE-2024-20496
This vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system.