Executive Risk Summary
"A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition. This vulnerability affects all versions of SNMP and requires a valid SNMP community string or valid SNMPv3 user credentials."
Operational Audit Arsenal
Target Type Firmware Image
Target Asset SNMP Service
Standard Path Global Firmware
Manual Verification Required
This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Reboot Required Likely
High
Internal Work Notes
CVE-2024-20268: Cisco ASA SNMP vulnerability allowing remote DoS, requires SNMP community string or valid SNMPv3 credentials. Verify device firmware version and apply patch as recommended by Cisco.
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Official Advisoryhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-7TcnzxTU
Official Advisoryhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO
Official Advisoryhttps://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300
Related Cisco Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.