CVE-2024-20339

8.6 HIGH

📋 TL;DR

This vulnerability in Cisco Firepower Threat Defense (FTD) Software allows unauthenticated remote attackers to cause a denial of service by sending specially crafted TLS traffic over IPv4. Affected systems include Cisco Firepower 2100 Series devices running vulnerable FTD software versions. Successful exploitation causes the device to reload, disrupting network traffic.

💻 Affected Systems

Products:
  • Cisco Firepower Threat Defense (FTD) Software
Versions: Specific versions not provided in CVE description; refer to Cisco advisory for exact affected versions
Operating Systems: Cisco FTD OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Firepower 2100 Series devices; vulnerability triggers when processing TLS traffic over IPv4

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device outage with extended downtime, disrupting all network traffic through the affected firewall and requiring manual intervention to restore service.

🟠

Likely Case

Intermittent device reloads causing periodic service disruptions, degraded network performance, and potential loss of connectivity for connected systems.

🟢

If Mitigated

Minimal impact with proper network segmentation and traffic filtering preventing malicious TLS packets from reaching vulnerable devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific TLS traffic patterns; no authentication needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Cisco advisory for specific fixed versions

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-QXYE5Ufy

Restart Required: Yes

Instructions:

1. Check current FTD version. 2. Review Cisco advisory for fixed versions. 3. Download and apply appropriate patch from Cisco. 4. Reboot device after patching.

🔧 Temporary Workarounds

TLS Traffic Filtering

all

Implement network filtering to block or restrict TLS traffic to vulnerable devices

# Use ACLs to filter TLS traffic
# Example: access-list deny tcp any any eq 443

Network Segmentation

all

Isolate vulnerable devices from untrusted networks

# Implement VLAN segmentation
# Use firewall rules to restrict access

🧯 If You Can't Patch

  • Implement strict network access controls to limit TLS traffic to trusted sources only
  • Deploy intrusion prevention systems to detect and block malicious TLS patterns

🔍 How to Verify

Check if Vulnerable:

Check FTD software version and compare against Cisco advisory; verify device model is Firepower 2100 Series

Check Version:

show version

Verify Fix Applied:

Confirm FTD version matches or exceeds patched version listed in Cisco advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reloads
  • TLS connection anomalies
  • High CPU/memory usage before crash

Network Indicators:

  • Abnormal TLS traffic patterns to firewall
  • Sudden loss of connectivity through device

SIEM Query:

device_type:"firepower" AND (event:"reload" OR event:"crash") AND protocol:"TLS"

🔗 References

📤 Share & Export