Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-20359: Improper Control of Generation of Code ('Code Injection') in Cisco Cisco Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2024-20359cvecve-2024-20359
Published: Wed Apr 24 2024 (04/24/2024, 18:16:49 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Adaptive Security Appliance (ASA) Software

Description

A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:03:17 UTC

Technical Analysis

CVE-2024-20359 is a vulnerability identified in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software, specifically in a legacy feature that supports preloading VPN clients and plug-ins. The root cause is improper validation of files read from the system flash memory, allowing an attacker with administrator privileges to place a maliciously crafted file onto the disk0: filesystem of the affected device. Upon the next device reload, this crafted file can be executed, resulting in arbitrary code execution with root-level privileges. This means the attacker can gain full control over the device, potentially altering system behavior and configurations. The vulnerability affects a wide range of ASA software versions, spanning from 9.8.1 through 9.20.2, covering many minor and patch releases. Exploitation requires local authenticated access with administrator-level privileges but does not require user interaction. The vulnerability is persistent, as the injected code remains effective across device reboots, which led Cisco to increase the Security Impact Rating from Medium to High. The CVSS v3.1 score is 6.0 (medium severity), with attack vector local, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality and integrity but no impact on availability. There are no known exploits in the wild at the time of publication. The vulnerability highlights the risks associated with legacy features and improper input validation in critical network security devices.

Potential Impact

The impact of CVE-2024-20359 is significant for organizations relying on Cisco ASA and FTD devices for network security, VPN access, and firewall functions. Successful exploitation grants root-level code execution, allowing attackers to fully compromise the device, modify configurations, intercept or redirect traffic, disable security controls, and maintain persistent access. This undermines the confidentiality and integrity of network traffic and security policies, potentially exposing sensitive data and enabling lateral movement within the network. Because the vulnerability requires administrator-level access, the initial compromise vector may be limited to insiders or attackers who have already breached administrative credentials. However, once exploited, the attacker gains persistent and powerful control over a critical security appliance, which can have cascading effects on the entire network security posture. The persistence of the injected code across reboots increases the difficulty of detection and remediation. Organizations with large deployments of affected Cisco ASA/FTD versions, especially in sectors with high security requirements such as finance, government, healthcare, and critical infrastructure, face elevated risk. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate the risk of future exploitation.

Mitigation Recommendations

To mitigate CVE-2024-20359, organizations should: 1) Immediately identify and inventory all Cisco ASA and FTD devices running affected software versions. 2) Apply Cisco's security patches or software updates that address this vulnerability as soon as they become available, prioritizing devices exposed to local administrative access. 3) Restrict local administrator access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) for administrative accounts. 4) Monitor and audit file system changes on disk0: to detect unauthorized or suspicious file additions or modifications. 5) Implement strict access controls and network segmentation to limit the ability of attackers to gain local administrative access. 6) Regularly review and harden device configurations, disabling legacy features that are not in use, especially those related to VPN client preloading. 7) Employ host-based and network-based intrusion detection systems to identify anomalous behavior indicative of code injection or unauthorized reboots. 8) Maintain comprehensive logging and alerting on administrative actions and device reload events. 9) Conduct regular security assessments and penetration tests to validate the effectiveness of controls around Cisco ASA/FTD devices. 10) Educate administrators on the risks of this vulnerability and the importance of safeguarding privileged credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2023-11-08T15:08:07.650Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b1247d717aace2690e

Added to database: 10/21/2025, 7:06:25 PM

Last enriched: 2/28/2026, 9:03:17 AM

Last updated: 3/25/2026, 9:47:31 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses