{"id":19139,"date":"2024-07-25T02:55:25","date_gmt":"2024-07-25T02:55:25","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=19139"},"modified":"2026-01-25T03:28:18","modified_gmt":"2026-01-25T03:28:18","slug":"the-risks-of-traditional-vpns-why-zero-day-vulnerabilities-are-a-major-threat","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat","title":{"rendered":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat"},"content":{"rendered":"\n<p>In the world of cybersecurity, remote access is essential for enterprise operations, allowing employees to work from anywhere and IT teams to manage systems remotely. However, traditional VPN\/SSLVPN devices, often integrated into Next-Generation Firewall (NGFW) platforms, have become a double-edged sword. While they facilitate secure remote access, they also present significant security risks. In this blog, we explore the dangers of traditional VPNs, the impact of zero-day vulnerabilities, and how modern solutions like <a href=\"\/en\" target=\"_blank\" rel=\"noopener\" title=\"\">Admin By Request<\/a> Remote Access offer a safer alternative, especially in light of the active exploitation of vulnerabilities like CVE-2024-20353 and CVE-2024-20359 affecting Cisco firewall platforms. Read more on the Cisco VPN vulnerability, and others like it, below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Problem with Traditional VPNs and Remote Access VPN Sessions<\/h2>\n\n\n\n<p>VPNs are designed to provide secure remote access to corporate networks, but their design and implementation can create vulnerabilities. These devices typically reside on the public internet, making them highly visible to malicious actors. This exposure, combined with their reliance on outdated security practices, often undermines their effectiveness.<\/p>\n\n\n\n<p>Specific affected devices, such as Windows, macOS, and Linux versions, can be compromised due to outdated security practices and configurations, making them susceptible to various vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Examples of Where VPNs are Lacking<\/h2>\n\n\n\n<p>For instance, many traditional VPNs may still utilize outdated encryption algorithms, such as DES or RC4, which are susceptible to brute-force attacks. Additionally, some VPN implementations may lack robust authentication mechanisms, relying solely on usernames and passwords rather than more secure methods like multi-factor authentication. Furthermore, inadequate patch management practices can leave VPN devices vulnerable to known exploits and vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero-Day Vulnerabilities and Their Impact: Execute Arbitrary Code<\/h2>\n\n\n\n<p>Zero-day vulnerabilities, or security flaws that are previously unknown and unpatched, have become a favorite target for cybercriminals. In 2024 alone, several high-profile VPN vendors have fallen victim to zero-day exploits, allowing attackers to gain unauthorized access to private networks through successful exploits. This creates significant risks for businesses, leading to unauthorized data access, system control, and potential breaches that can take months to detect. It\u2019s critical to understand why traditional <a href=\"\/en\/blogs\/mitigating-the-dangers-of-traditional-remote-access-solutions\" target=\"_blank\" rel=\"noopener\" title=\"\">remote access solutions<\/a> are so vulnerable, and what steps can be taken to mitigate these risks.<\/p>\n\n\n\n<p>In 2024, four major VPN vendors faced these vulnerabilities, highlighting the risks associated with traditional remote access solutions. Let\u2019s delve into these incidents and understand how they affected some of the industry\u2019s leading companies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Palo Alto Networks<\/h3>\n\n\n\n<p>Palo Alto Networks suffered from a critical command injection vulnerability (CVE-2024-3400), which was exploited in limited attacks. This vulnerability allowed attackers to gain control over specific Palo Alto firewalls, resulting in a significant breach. Researchers from Palo Alto Networks&#8217; Unit 42 and Volexity released threat briefs detailing how the backdoor, dubbed UPSTYLE, works and persists within targeted devices. This Python-based backdoor allows threat actors to execute arbitrary commands, and if left unchecked, can lead to data theft and lateral movement across corporate networks.<\/p>\n\n\n\n<p>Further investigation revealed that attackers were targeting domain backup keys and active directory credentials, using a service account to pivot across affected networks. PAN urged customers to implement mitigations and workarounds quickly, as the attacks could escalate, and more threat actors could exploit the vulnerability. Palo Alto Networks also provided guidance on collecting logs and preserving forensic artifacts, emphasizing the need for swift and comprehensive response to prevent further damage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cisco Adaptive Security Appliance<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.cisco.com\/\">Cisco\u2019s<\/a> Adaptive Security Appliances (ASA) were compromised through two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359). A state-sponsored threat actor used custom malware to install backdoors on Cisco Adaptive Security Appliance devices, leading to unauthorized access to government networks worldwide. Cisco Talos, in collaboration with other companies and governmental agencies, investigated the attack, revealing that it involved bespoke tooling and sophisticated anti-forensic measures, indicating a state-sponsored source.<\/p>\n\n\n\n<p>The attackers used custom malware, Line Dancer and Line Runner, to maintain persistence and execute arbitrary commands on the Cisco ASA devices. For example, a Cisco ASA device with specific SSL listen sockets was found to be affected. This campaign, known as ArcaneDoor, highlighted the ongoing threats to \u201cedge\u201d networking devices like VPNs and firewalls running Cisco ASA Software. Additionally, vulnerabilities in Cisco Firepower Threat Defense were significant in this context.<\/p>\n\n\n\n<p>Cisco released patches and provided guidance to mitigate the vulnerabilities affecting Cisco firewall platforms, encouraging customers to monitor system logs and apply patches immediately to prevent further exploitation. Specific CVEs such as CVE-2024-20353, CVE-2024-20358, and CVE-2024-20359 were exploited in the Firepower Threat Defense (FTD) software. The attackers targeted FTD software, emphasizing the importance of updating to the latest version to mitigate these vulnerabilities. It is crucial to check if a device is running Cisco ASA Software to determine vulnerability.<\/p>\n\n\n\n<p>The threat actor exploited vulnerabilities in Cisco Firepower Threat Defense (FTD) Software, targeting government-owned perimeter network devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Fortinet<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.fortinet.com\/\">Fortinet<\/a> faced critical remote code execution vulnerabilities (CVE-2024-21762, CVE-2024-23313) that could allow remote attackers to execute arbitrary code or commands. The exploitation of these vulnerabilities was confirmed by <a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign\">CISA<\/a>, though the details of the attacks remain undisclosed. CVE-2024-21762 and CVE-2024-23313 affect various versions of FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager.<\/p>\n\n\n\n<p>Fortinet advised users to migrate to fixed releases or apply workarounds to mitigate the risks. Rapid7 researchers noted that Fortinet SSL <a href=\"\/en\/blogs\/vpn-vulnerabilities-exposed-rethinking-remote-access\" target=\"_blank\" rel=\"noopener\" title=\"\">VPN vulnerabilities<\/a> have a history of being targeted by state-sponsored threat actors. Fortinet&#8217;s case demonstrates the ongoing need for vigilance and timely patching to safeguard against potential breaches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ivanti<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.ivanti.com\/\">Ivanti<\/a> Connect Secure VPN gateways and Policy Secure suffered from a server-side request forgery (SSRF) vulnerability (CVE-2024-21893), allowing attackers to bypass authentication and access restricted resources. This flaw, when chained with a command injection vulnerability, led to unauthorized remote code execution. Ivanti and Mandiant explained that this new technique bypassed Ivanti&#8217;s original mitigation, indicating a significant security concern.<\/p>\n\n\n\n<p>Ivanti&#8217;s case highlighted the challenges organizations face when dealing with zero-day vulnerabilities in widely used remote access solutions. This exploitation added to Ivanti&#8217;s existing security concerns, prompting the US Cybersecurity and Infrastructure Agency (CISA) to recommend disconnecting all instances of Ivanti Connect Secure and Policy Secure products from agency networks.<\/p>\n\n\n\n<p>These incidents underscore the inherent dangers of traditional remote access solutions, driven by outdated security practices, misconfiguration, and resistance to technological changes. The vulnerabilities left these devices susceptible to unauthorized access, leading to a lack of business continuity and significant security risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Urgency for a New Approach Amid Active Exploitation<\/h2>\n\n\n\n<p>Given the growing risks associated with zero-day vulnerabilities and traditional remote access solutions, it\u2019s crucial to consider modern alternatives that offer enhanced security features. Following a security advisory from official sources is essential to mitigate vulnerabilities and protect your systems. Admin By Request\u2019s Remote Access provides a secure and comprehensive solution, combining multi-factor authentication, endpoint security, and real-time monitoring to prevent unauthorized access.<\/p>\n\n\n\n<p>Admin By Request\u2019s approach focuses on <a href=\"\/en\/blogs\/pam-for-dummies-what-is-privileged-access-management\" target=\"_blank\" rel=\"noopener\" title=\"\">Privileged Access Management<\/a> (PAM) and ensures a layered defense strategy. With robust session recording, time-limited access authorization, and browser-based remote access, organizations can maintain strict security protocols without compromising productivity. This solution can help organizations safeguard against zero-day vulnerabilities and ensure that remote access is secure and reliable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Traditional VPNs pose significant risks due to their inherent vulnerabilities and exposure to zero-day exploits. To protect against these dangers, organizations must adopt a more secure approach to remote access. Admin By Request Remote Access offers a comprehensive solution that addresses the limitations of traditional VPNs, providing advanced security features and a user-friendly experience. By embracing modern remote access solutions, businesses can safeguard their digital assets, maintain compliance, and protect their operations from cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where to Next?<\/h2>\n\n\n\n<p>If you&#8217;re interested in learning more about Admin By Request Remote Access and how it can help secure your organization&#8217;s remote access needs, contact us today. Don&#8217;t let outdated remote access solutions put your business at risk\u2014choose a safer, more secure alternative.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.<\/p>\n","protected":false},"author":2,"featured_media":19141,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[148,106,20,67,68,332,355],"ppma_author":[9],"class_list":["post-19139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cybersecurity","tag-features","tag-least-privilege","tag-pam","tag-privileged-access-management","tag-remote-access","tag-vpn","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"cybersecurity,features,least privilege,pam,privileged access management,remote access,vpn\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat\" \/>\n\t\t<meta property=\"og:description\" content=\"Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2024-07-25T02:55:25+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T03:28:18+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#blogposting\",\"name\":\"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat\",\"headline\":\"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/GreySheild.png\",\"width\":2560,\"height\":1440,\"caption\":\"Digital graphic of a shield made up of light particles hovering in an orb\"},\"datePublished\":\"2024-07-25T02:55:25+00:00\",\"dateModified\":\"2026-01-25T03:28:18+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#webpage\"},\"articleSection\":\"Blogs, Cybersecurity, Features, least privilege, PAM, Privileged Access Management, Remote Access, VPN, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#listItem\",\"name\":\"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#listItem\",\"position\":3,\"name\":\"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\",\"name\":\"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat\",\"description\":\"Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/GreySheild.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\\\/#mainImage\",\"width\":2560,\"height\":1440,\"caption\":\"Digital graphic of a shield made up of light particles hovering in an orb\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#mainImage\"},\"datePublished\":\"2024-07-25T02:55:25+00:00\",\"dateModified\":\"2026-01-25T03:28:18+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat<\/title>\n\n","aioseo_head_json":{"title":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat","description":"Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cybersecurity,features,least privilege,pam,privileged access management,remote access,vpn","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#blogposting","name":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat","headline":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2024\/05\/GreySheild.png","width":2560,"height":1440,"caption":"Digital graphic of a shield made up of light particles hovering in an orb"},"datePublished":"2024-07-25T02:55:25+00:00","dateModified":"2026-01-25T03:28:18+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#webpage"},"articleSection":"Blogs, Cybersecurity, Features, least privilege, PAM, Privileged Access Management, Remote Access, VPN, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#listItem","name":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#listItem","position":3,"name":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat","name":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat","description":"Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2024\/05\/GreySheild.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat\/#mainImage","width":2560,"height":1440,"caption":"Digital graphic of a shield made up of light particles hovering in an orb"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat#mainImage"},"datePublished":"2024-07-25T02:55:25+00:00","dateModified":"2026-01-25T03:28:18+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat","og:description":"Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2024-07-25T02:55:25+00:00","article:modified_time":"2026-01-25T03:28:18+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat","twitter:description":"Cisco VPN Vulnerability: In 2024, top VPN vendors faced zero-day exploits, exposing private networks. Discover how these incidents impacted major companies.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"19139","title":"#post_title","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"Cisco VPN Vulnerability","score":75,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":3},"keyphraseInURL":{"score":5,"maxScore":5,"error":0},"keyphraseInIntroduction":{"score":9,"maxScore":9,"error":0},"keyphraseInSubHeadings":{"score":3,"maxScore":9,"error":1},"keyphraseInImageAlt":[],"keywordDensity":{"score":0,"type":"low","maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 03:33:09","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2024-05-10 01:06:59","updated":"2026-01-25 03:33:09"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tCisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Cisco VPN Vulnerability 2024: The Risks of Traditional VPNs and Why Zero-Day Vulnerabilities Are a Major Threat","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/cisco-vpn-vulnerability-the-risks-of-traditional-vpns-and-why-zeroday-vulnerabilities-are-a-major-threat"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/19139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=19139"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/19139\/revisions"}],"predecessor-version":[{"id":19785,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/19139\/revisions\/19785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/19141"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=19139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=19139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=19139"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=19139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}