8.5
CVE-2025-20251
- EPSS 0.17%
- Published 14.08.2025 16:29:30
- Last modified 15.08.2025 13:12:51
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to create or delete arbitrary files on the underlying operating system. If critical system files are manipulated, new Remote Access SSL VPN sessions could be denied and existing sessions could be dropped, causing a denial of service (DoS) condition. An exploited device requires a manual reboot to recover. This vulnerability is due to insufficient input validation when processing HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to create or delete files on the underlying operating system, which could cause the Remote Access SSL VPN service to become unresponsive. To exploit this vulnerability, the attacker must be authenticated as a VPN user of the affected device.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorCisco
≫
Product
Cisco Adaptive Security Appliance (ASA) Software
Default Statusunknown
Version
9.12.3
Status
affected
Version
9.8.3
Status
affected
Version
9.12.1
Status
affected
Version
9.8.1
Status
affected
Version
9.12.2
Status
affected
Version
9.8.2.45
Status
affected
Version
9.8.2
Status
affected
Version
9.8.4
Status
affected
Version
9.14.1
Status
affected
Version
9.12.4
Status
affected
Version
9.8.2.26
Status
affected
Version
9.8.2.24
Status
affected
Version
9.8.2.15
Status
affected
Version
9.8.2.14
Status
affected
Version
9.8.2.35
Status
affected
Version
9.8.2.20
Status
affected
Version
9.8.2.8
Status
affected
Version
9.8.2.17
Status
affected
Version
9.8.2.28
Status
affected
Version
9.8.2.33
Status
affected
Version
9.8.2.38
Status
affected
Version
9.8.4.25
Status
affected
Version
9.12.3.2
Status
affected
Version
9.12.3.7
Status
affected
Version
9.8.3.18
Status
affected
Version
9.8.3.14
Status
affected
Version
9.8.4.15
Status
affected
Version
9.8.4.8
Status
affected
Version
9.8.1.7
Status
affected
Version
9.8.3.29
Status
affected
Version
9.14.1.10
Status
affected
Version
9.12.2.5
Status
affected
Version
9.8.4.22
Status
affected
Version
9.12.3.12
Status
affected
Version
9.8.4.7
Status
affected
Version
9.8.4.17
Status
affected
Version
9.8.3.16
Status
affected
Version
9.8.4.20
Status
affected
Version
9.8.3.11
Status
affected
Version
9.12.1.3
Status
affected
Version
9.8.4.3
Status
affected
Version
9.12.2.4
Status
affected
Version
9.8.4.12
Status
affected
Version
9.12.1.2
Status
affected
Version
9.8.3.26
Status
affected
Version
9.8.1.5
Status
affected
Version
9.12.2.9
Status
affected
Version
9.12.3.9
Status
affected
Version
9.8.3.21
Status
affected
Version
9.8.4.10
Status
affected
Version
9.12.2.1
Status
affected
Version
9.12.4.2
Status
affected
Version
9.14.1.6
Status
affected
Version
9.8.3.8
Status
affected
Version
9.14.1.15
Status
affected
Version
9.14.1.19
Status
affected
Version
9.8.4.26
Status
affected
Version
9.12.4.4
Status
affected
Version
9.14.1.30
Status
affected
Version
9.8.4.29
Status
affected
Version
9.12.4.7
Status
affected
Version
9.14.2
Status
affected
Version
9.12.4.8
Status
affected
Version
9.8.4.32
Status
affected
Version
9.12.4.10
Status
affected
Version
9.14.2.4
Status
affected
Version
9.14.2.8
Status
affected
Version
9.12.4.13
Status
affected
Version
9.8.4.33
Status
affected
Version
9.14.2.13
Status
affected
Version
9.8.4.34
Status
affected
Version
9.12.4.18
Status
affected
Version
9.8.4.35
Status
affected
Version
9.14.2.15
Status
affected
Version
9.12.4.24
Status
affected
Version
9.16.1
Status
affected
Version
9.8.4.39
Status
affected
Version
9.14.3
Status
affected
Version
9.12.4.26
Status
affected
Version
9.16.1.28
Status
affected
Version
9.14.3.1
Status
affected
Version
9.12.4.29
Status
affected
Version
9.14.3.9
Status
affected
Version
9.16.2
Status
affected
Version
9.12.4.30
Status
affected
Version
9.16.2.3
Status
affected
Version
9.8.4.40
Status
affected
Version
9.14.3.11
Status
affected
Version
9.12.4.35
Status
affected
Version
9.8.4.41
Status
affected
Version
9.14.3.13
Status
affected
Version
9.16.2.7
Status
affected
Version
9.12.4.37
Status
affected
Version
9.14.3.15
Status
affected
Version
9.17.1
Status
affected
Version
9.16.2.11
Status
affected
Version
9.14.3.18
Status
affected
Version
9.16.2.13
Status
affected
Version
9.12.4.39
Status
affected
Version
9.12.4.38
Status
affected
Version
9.8.4.43
Status
affected
Version
9.14.4
Status
affected
Version
9.16.2.14
Status
affected
Version
9.17.1.7
Status
affected
Version
9.12.4.40
Status
affected
Version
9.16.3.3
Status
affected
Version
9.14.4.6
Status
affected
Version
9.16.3
Status
affected
Version
9.16.3.14
Status
affected
Version
9.17.1.9
Status
affected
Version
9.14.4.7
Status
affected
Version
9.12.4.41
Status
affected
Version
9.17.1.10
Status
affected
Version
9.8.4.44
Status
affected
Version
9.18.1
Status
affected
Version
9.12.4.47
Status
affected
Version
9.14.4.12
Status
affected
Version
9.16.3.15
Status
affected
Version
9.18.1.3
Status
affected
Version
9.17.1.11
Status
affected
Version
9.12.4.48
Status
affected
Version
9.14.4.13
Status
affected
Version
9.18.2
Status
affected
Version
9.16.3.19
Status
affected
Version
9.17.1.13
Status
affected
Version
9.12.4.50
Status
affected
Version
9.14.4.14
Status
affected
Version
9.17.1.15
Status
affected
Version
9.8.4.45
Status
affected
Version
9.12.4.52
Status
affected
Version
9.14.4.15
Status
affected
Version
9.16.3.23
Status
affected
Version
9.18.2.5
Status
affected
Version
9.16.4
Status
affected
Version
9.12.4.54
Status
affected
Version
9.14.4.17
Status
affected
Version
9.8.4.46
Status
affected
Version
9.17.1.20
Status
affected
Version
9.18.2.7
Status
affected
Version
9.19.1
Status
affected
Version
9.16.4.9
Status
affected
Version
9.12.4.55
Status
affected
Version
9.18.2.8
Status
affected
Version
9.14.4.22
Status
affected
Version
9.16.4.14
Status
affected
Version
9.8.4.48
Status
affected
Version
9.18.3
Status
affected
Version
9.19.1.5
Status
affected
Version
9.14.4.23
Status
affected
Version
9.12.4.56
Status
affected
Version
9.16.4.18
Status
affected
Version
9.17.1.30
Status
affected
Version
9.19.1.9
Status
affected
Version
9.18.3.39
Status
affected
Version
9.16.4.19
Status
affected
Version
9.12.4.58
Status
affected
Version
9.19.1.12
Status
affected
Version
9.18.3.46
Status
affected
Version
9.16.4.27
Status
affected
Version
9.19.1.18
Status
affected
Version
9.18.3.53
Status
affected
Version
9.18.3.55
Status
affected
Version
9.16.4.38
Status
affected
Version
9.17.1.33
Status
affected
Version
9.12.4.62
Status
affected
Version
9.16.4.39
Status
affected
Version
9.18.3.56
Status
affected
Version
9.20.1
Status
affected
Version
9.16.4.42
Status
affected
Version
9.19.1.22
Status
affected
Version
9.18.4
Status
affected
Version
9.20.1.5
Status
affected
Version
9.18.4.5
Status
affected
Version
9.19.1.24
Status
affected
Version
9.16.4.48
Status
affected
Version
9.18.4.8
Status
affected
Version
9.20.2
Status
affected
Version
9.19.1.27
Status
affected
Version
9.12.4.65
Status
affected
Version
9.16.4.55
Status
affected
Version
9.18.4.22
Status
affected
Version
9.20.2.10
Status
affected
Version
9.16.4.57
Status
affected
Version
9.19.1.28
Status
affected
Version
9.17.1.39
Status
affected
Version
9.12.4.67
Status
affected
Version
9.14.4.24
Status
affected
Version
9.18.4.24
Status
affected
Version
9.20.2.21
Status
affected
Version
9.16.4.61
Status
affected
Version
9.19.1.31
Status
affected
Version
9.18.4.29
Status
affected
Version
9.20.2.22
Status
affected
Version
9.16.4.62
Status
affected
Version
9.18.4.34
Status
affected
Version
9.20.3
Status
affected
Version
9.16.4.67
Status
affected
Version
9.16.4.70
Status
affected
Version
9.18.4.40
Status
affected
Version
9.23.1
Status
affected
Version
9.22.1.1
Status
affected
Version
9.16.4.71
Status
affected
Version
9.20.3.4
Status
affected
Version
9.18.4.47
Status
affected
Version
9.20.3.7
Status
affected
Version
9.17.1.45
Status
affected
Version
9.19.1.37
Status
affected
Version
9.17.1.46
Status
affected
Version
9.16.4.76
Status
affected
Version
9.20.3.9
Status
affected
Version
9.19.1.38
Status
affected
Version
9.18.4.50
Status
affected
Version
9.22.1.3
Status
affected
Version
9.20.3.10
Status
affected
Version
9.22.1.2
Status
affected
Version
9.18.4.52
Status
affected
Version
9.20.3.13
Status
affected
Version
9.22.1.6
Status
affected
Version
9.18.4.53
Status
affected
Version
9.16.4.82
Status
affected
VendorCisco
≫
Product
Cisco Firepower Threat Defense Software
Default Statusunknown
Version
6.2.3.14
Status
affected
Version
6.4.0.1
Status
affected
Version
6.2.3.7
Status
affected
Version
6.2.3
Status
affected
Version
6.4.0.2
Status
affected
Version
6.2.3.9
Status
affected
Version
6.2.3.1
Status
affected
Version
6.2.3.2
Status
affected
Version
6.4.0.5
Status
affected
Version
6.2.3.10
Status
affected
Version
6.4.0
Status
affected
Version
6.4.0.3
Status
affected
Version
6.2.3.6
Status
affected
Version
6.4.0.4
Status
affected
Version
6.2.3.15
Status
affected
Version
6.2.3.5
Status
affected
Version
6.2.3.4
Status
affected
Version
6.2.3.3
Status
affected
Version
6.2.3.8
Status
affected
Version
6.4.0.6
Status
affected
Version
6.2.3.11
Status
affected
Version
6.2.3.12
Status
affected
Version
6.2.3.13
Status
affected
Version
6.4.0.7
Status
affected
Version
6.4.0.8
Status
affected
Version
6.6.0
Status
affected
Version
6.4.0.9
Status
affected
Version
6.2.3.16
Status
affected
Version
6.6.0.1
Status
affected
Version
6.6.1
Status
affected
Version
6.4.0.10
Status
affected
Version
6.4.0.11
Status
affected
Version
6.6.3
Status
affected
Version
6.6.4
Status
affected
Version
6.4.0.12
Status
affected
Version
7.0.0
Status
affected
Version
6.2.3.17
Status
affected
Version
7.0.0.1
Status
affected
Version
6.6.5
Status
affected
Version
7.0.1
Status
affected
Version
7.1.0
Status
affected
Version
6.4.0.13
Status
affected
Version
6.6.5.1
Status
affected
Version
6.2.3.18
Status
affected
Version
7.0.1.1
Status
affected
Version
6.4.0.14
Status
affected
Version
7.1.0.1
Status
affected
Version
6.6.5.2
Status
affected
Version
7.0.2
Status
affected
Version
6.4.0.15
Status
affected
Version
7.2.0
Status
affected
Version
7.0.2.1
Status
affected
Version
7.0.3
Status
affected
Version
6.6.7
Status
affected
Version
7.1.0.2
Status
affected
Version
7.2.0.1
Status
affected
Version
7.0.4
Status
affected
Version
7.2.1
Status
affected
Version
7.0.5
Status
affected
Version
6.4.0.16
Status
affected
Version
7.3.0
Status
affected
Version
7.2.2
Status
affected
Version
7.2.3
Status
affected
Version
6.6.7.1
Status
affected
Version
7.3.1
Status
affected
Version
7.1.0.3
Status
affected
Version
7.2.4
Status
affected
Version
7.0.6
Status
affected
Version
7.2.5
Status
affected
Version
7.2.4.1
Status
affected
Version
7.3.1.1
Status
affected
Version
7.4.0
Status
affected
Version
6.4.0.17
Status
affected
Version
7.0.6.1
Status
affected
Version
7.2.5.1
Status
affected
Version
7.4.1
Status
affected
Version
7.2.6
Status
affected
Version
7.0.6.2
Status
affected
Version
7.4.1.1
Status
affected
Version
6.6.7.2
Status
affected
Version
6.4.0.18
Status
affected
Version
7.2.7
Status
affected
Version
7.2.5.2
Status
affected
Version
7.3.1.2
Status
affected
Version
7.2.8
Status
affected
Version
7.6.0
Status
affected
Version
7.4.2
Status
affected
Version
7.2.8.1
Status
affected
Version
7.0.6.3
Status
affected
Version
7.4.2.1
Status
affected
Version
7.2.9
Status
affected
Version
7.0.7
Status
affected
Version
7.7.0
Status
affected
Version
7.4.2.2
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.17% | 0.385 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@cisco.com | 8.5 | 3.1 | 4.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
|
CWE-1287 Improper Validation of Specified Type of Input
The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.