Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-20481: Missing Release of Resource after Effective Lifetime in Cisco Cisco Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2024-20481cvecve-2024-20481
Published: Wed Oct 23 2024 (10/23/2024, 17:51:38 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the RAVPN service. This vulnerability is due to resource exhaustion. An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device. A successful exploit could allow the attacker to exhaust resources, resulting in a DoS of the RAVPN service on the affected device. Depending on the impact of the attack, a reload of the device may be required to restore the RAVPN service. Services that are not related to VPN are not affected. Cisco Talos discussed these attacks in the blog post Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:04:04 UTC

Technical Analysis

CVE-2024-20481 is a vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software. The flaw stems from a failure to release allocated resources after their effective lifetime, resulting in resource exhaustion. An unauthenticated, remote attacker can exploit this by sending a large volume of VPN authentication requests, overwhelming the device's resources dedicated to RAVPN. This resource exhaustion leads to a denial of service (DoS) condition specifically targeting the VPN service, rendering it unavailable. Other services on the device remain unaffected. The vulnerability spans a wide range of ASA software versions, from 9.8.1 up to 9.20.2, indicating a long-standing issue across multiple releases. The attack does not require authentication or user interaction, and the scope is limited to the VPN service, but the impact can be significant for organizations relying on VPN connectivity. Cisco Talos has noted similar brute-force attacks targeting VPN and SSH services, underscoring the relevance of this vulnerability in ongoing threat landscapes. No public exploits have been reported yet, but the potential for disruption is notable. The CVSS v3.1 score is 5.8 (medium), reflecting the vulnerability's ease of exploitation and impact limited to availability of the VPN service. Remediation involves applying patches when released and implementing rate-limiting and monitoring controls to detect and mitigate excessive authentication attempts.

Potential Impact

The primary impact of CVE-2024-20481 is denial of service of the Remote Access VPN service on affected Cisco ASA and FTD devices. Organizations relying heavily on VPN connectivity for remote access, secure communications, and business continuity may experience significant operational disruptions. This can affect remote workforce productivity, delay critical communications, and potentially expose organizations to secondary risks if fallback or alternative access methods are insecure. Although other device services remain operational, loss of VPN access can hinder incident response and management activities. The requirement to reload the device to restore VPN service after exploitation can cause additional downtime and administrative overhead. Given the widespread deployment of Cisco ASA devices in enterprise, government, and critical infrastructure networks worldwide, the vulnerability poses a moderate risk to global organizations. Attackers can exploit this vulnerability without authentication or user interaction, increasing the likelihood of opportunistic attacks, especially in environments with exposed VPN endpoints. The medium severity rating reflects the limited scope but notable availability impact and ease of exploitation.

Mitigation Recommendations

1. Monitor VPN authentication request rates closely to detect unusual spikes indicative of brute-force or resource exhaustion attempts. 2. Implement rate limiting or throttling on VPN authentication requests to prevent resource exhaustion. 3. Restrict VPN access to known IP ranges or use geo-blocking to reduce exposure to external attackers. 4. Deploy network-based intrusion detection and prevention systems (IDS/IPS) tuned to identify and block excessive authentication attempts targeting VPN services. 5. Apply Cisco's security advisories and patches promptly once available for affected ASA and FTD software versions. 6. Consider deploying multi-factor authentication (MFA) to reduce the risk of brute-force attacks, even though this vulnerability does not require authentication. 7. Regularly review and update VPN configurations to minimize attack surface and ensure best practices are followed. 8. Maintain robust incident response plans to quickly address VPN service outages and perform device reloads if necessary with minimal disruption. 9. Segment VPN infrastructure from other critical network components to contain potential impacts. 10. Engage with Cisco support for guidance on interim workarounds or mitigations if patches are not immediately available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2023-11-08T15:08:07.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b1247d717aace26918

Added to database: 10/21/2025, 7:06:25 PM

Last enriched: 2/28/2026, 9:04:04 AM

Last updated: 3/25/2026, 9:48:20 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses