From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Description: - Vulnerability Name: Cisco Adaptive Security Appliance and Firepower Threat Defense Software NSG Access Control List Bypass Vulnerability - Vulnerability ID: cisco-sa-asaftd-nsgacl-bypass-77XnEAsL - CVE Number: CVE-2024-20384 - CWE Number: CWE-290 - Release Date: October 23, 2024 - Severity: Medium 2. Affected Products: - Cisco Adaptive Security Appliance (ASA) Software - Cisco Firepower Threat Defense (FTD) Software 3. Vulnerability Impact: - Unauthorized remote attackers can bypass configured Access Control Lists (ACLs) on affected devices and allow traffic that should be denied. - This vulnerability is caused by a logic error that occurs when NSG ACLs are enabled on affected devices. 4. Solution: - Cisco has released software updates to address this vulnerability. - No workarounds are available. 5. Affected Software Versions: - Specific affected software versions are not provided. 6. Workarounds: - No workarounds are available. 7. Fixed Software: - When considering software upgrades, it is recommended to regularly review Cisco product security advisories to determine exposure and identify upgrade solutions. 8. Affected Product List: - Cisco Adaptive Security Appliance (ASA) Software - Cisco Firepower Threat Defense (FTD) Software 9. Additional Resources: - Cisco ASA Compatibility Guide - Cisco Secure Firewall ASA Upgrade Guide - Cisco Secure Firewall Threat Defense Compatibility Guide 10. Exploitation and Public Announcements: - Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious exploitation related to the vulnerability described in this advisory. 11. Source: - The vulnerability was discovered during internal security testing. 12. URL: - Security advisory URL: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL 13. Revision History: - Version 1.0: Initial public release, Status: Final, Date: October 23, 2024 14. Legal Disclaimer: - This document is provided "AS IS" without warranty of any kind, including but not limited to the warranties of merchantability or fitness for a particular purpose. The use of this document or any materials linked to it is at the user’s own risk. Cisco reserves the right to change or update this document at any time. This information provides a detailed description of the vulnerability, affected products, solutions, affected software versions, workarounds, fixed software, affected product list, exploitation and public announcements, source, URL, revision history, and legal disclaimer.