8.5

CVE-2025-20251

A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to create or delete arbitrary files on the underlying operating system. If critical system files are manipulated, new Remote Access SSL VPN sessions could be denied and existing sessions could be dropped, causing a denial of service (DoS) condition. An exploited device requires a manual reboot to recover.

This vulnerability is due to insufficient input validation when processing HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to create or delete files on the underlying operating system, which could cause the Remote Access SSL VPN service to become unresponsive.
To exploit this vulnerability, the attacker must be authenticated as a VPN user of the affected device.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorCisco
Product Cisco Adaptive Security Appliance (ASA) Software
Default Statusunknown
Version 9.12.3
Status affected
Version 9.8.3
Status affected
Version 9.12.1
Status affected
Version 9.8.1
Status affected
Version 9.12.2
Status affected
Version 9.8.2.45
Status affected
Version 9.8.2
Status affected
Version 9.8.4
Status affected
Version 9.14.1
Status affected
Version 9.12.4
Status affected
Version 9.8.2.26
Status affected
Version 9.8.2.24
Status affected
Version 9.8.2.15
Status affected
Version 9.8.2.14
Status affected
Version 9.8.2.35
Status affected
Version 9.8.2.20
Status affected
Version 9.8.2.8
Status affected
Version 9.8.2.17
Status affected
Version 9.8.2.28
Status affected
Version 9.8.2.33
Status affected
Version 9.8.2.38
Status affected
Version 9.8.4.25
Status affected
Version 9.12.3.2
Status affected
Version 9.12.3.7
Status affected
Version 9.8.3.18
Status affected
Version 9.8.3.14
Status affected
Version 9.8.4.15
Status affected
Version 9.8.4.8
Status affected
Version 9.8.1.7
Status affected
Version 9.8.3.29
Status affected
Version 9.14.1.10
Status affected
Version 9.12.2.5
Status affected
Version 9.8.4.22
Status affected
Version 9.12.3.12
Status affected
Version 9.8.4.7
Status affected
Version 9.8.4.17
Status affected
Version 9.8.3.16
Status affected
Version 9.8.4.20
Status affected
Version 9.8.3.11
Status affected
Version 9.12.1.3
Status affected
Version 9.8.4.3
Status affected
Version 9.12.2.4
Status affected
Version 9.8.4.12
Status affected
Version 9.12.1.2
Status affected
Version 9.8.3.26
Status affected
Version 9.8.1.5
Status affected
Version 9.12.2.9
Status affected
Version 9.12.3.9
Status affected
Version 9.8.3.21
Status affected
Version 9.8.4.10
Status affected
Version 9.12.2.1
Status affected
Version 9.12.4.2
Status affected
Version 9.14.1.6
Status affected
Version 9.8.3.8
Status affected
Version 9.14.1.15
Status affected
Version 9.14.1.19
Status affected
Version 9.8.4.26
Status affected
Version 9.12.4.4
Status affected
Version 9.14.1.30
Status affected
Version 9.8.4.29
Status affected
Version 9.12.4.7
Status affected
Version 9.14.2
Status affected
Version 9.12.4.8
Status affected
Version 9.8.4.32
Status affected
Version 9.12.4.10
Status affected
Version 9.14.2.4
Status affected
Version 9.14.2.8
Status affected
Version 9.12.4.13
Status affected
Version 9.8.4.33
Status affected
Version 9.14.2.13
Status affected
Version 9.8.4.34
Status affected
Version 9.12.4.18
Status affected
Version 9.8.4.35
Status affected
Version 9.14.2.15
Status affected
Version 9.12.4.24
Status affected
Version 9.16.1
Status affected
Version 9.8.4.39
Status affected
Version 9.14.3
Status affected
Version 9.12.4.26
Status affected
Version 9.16.1.28
Status affected
Version 9.14.3.1
Status affected
Version 9.12.4.29
Status affected
Version 9.14.3.9
Status affected
Version 9.16.2
Status affected
Version 9.12.4.30
Status affected
Version 9.16.2.3
Status affected
Version 9.8.4.40
Status affected
Version 9.14.3.11
Status affected
Version 9.12.4.35
Status affected
Version 9.8.4.41
Status affected
Version 9.14.3.13
Status affected
Version 9.16.2.7
Status affected
Version 9.12.4.37
Status affected
Version 9.14.3.15
Status affected
Version 9.17.1
Status affected
Version 9.16.2.11
Status affected
Version 9.14.3.18
Status affected
Version 9.16.2.13
Status affected
Version 9.12.4.39
Status affected
Version 9.12.4.38
Status affected
Version 9.8.4.43
Status affected
Version 9.14.4
Status affected
Version 9.16.2.14
Status affected
Version 9.17.1.7
Status affected
Version 9.12.4.40
Status affected
Version 9.16.3.3
Status affected
Version 9.14.4.6
Status affected
Version 9.16.3
Status affected
Version 9.16.3.14
Status affected
Version 9.17.1.9
Status affected
Version 9.14.4.7
Status affected
Version 9.12.4.41
Status affected
Version 9.17.1.10
Status affected
Version 9.8.4.44
Status affected
Version 9.18.1
Status affected
Version 9.12.4.47
Status affected
Version 9.14.4.12
Status affected
Version 9.16.3.15
Status affected
Version 9.18.1.3
Status affected
Version 9.17.1.11
Status affected
Version 9.12.4.48
Status affected
Version 9.14.4.13
Status affected
Version 9.18.2
Status affected
Version 9.16.3.19
Status affected
Version 9.17.1.13
Status affected
Version 9.12.4.50
Status affected
Version 9.14.4.14
Status affected
Version 9.17.1.15
Status affected
Version 9.8.4.45
Status affected
Version 9.12.4.52
Status affected
Version 9.14.4.15
Status affected
Version 9.16.3.23
Status affected
Version 9.18.2.5
Status affected
Version 9.16.4
Status affected
Version 9.12.4.54
Status affected
Version 9.14.4.17
Status affected
Version 9.8.4.46
Status affected
Version 9.17.1.20
Status affected
Version 9.18.2.7
Status affected
Version 9.19.1
Status affected
Version 9.16.4.9
Status affected
Version 9.12.4.55
Status affected
Version 9.18.2.8
Status affected
Version 9.14.4.22
Status affected
Version 9.16.4.14
Status affected
Version 9.8.4.48
Status affected
Version 9.18.3
Status affected
Version 9.19.1.5
Status affected
Version 9.14.4.23
Status affected
Version 9.12.4.56
Status affected
Version 9.16.4.18
Status affected
Version 9.17.1.30
Status affected
Version 9.19.1.9
Status affected
Version 9.18.3.39
Status affected
Version 9.16.4.19
Status affected
Version 9.12.4.58
Status affected
Version 9.19.1.12
Status affected
Version 9.18.3.46
Status affected
Version 9.16.4.27
Status affected
Version 9.19.1.18
Status affected
Version 9.18.3.53
Status affected
Version 9.18.3.55
Status affected
Version 9.16.4.38
Status affected
Version 9.17.1.33
Status affected
Version 9.12.4.62
Status affected
Version 9.16.4.39
Status affected
Version 9.18.3.56
Status affected
Version 9.20.1
Status affected
Version 9.16.4.42
Status affected
Version 9.19.1.22
Status affected
Version 9.18.4
Status affected
Version 9.20.1.5
Status affected
Version 9.18.4.5
Status affected
Version 9.19.1.24
Status affected
Version 9.16.4.48
Status affected
Version 9.18.4.8
Status affected
Version 9.20.2
Status affected
Version 9.19.1.27
Status affected
Version 9.12.4.65
Status affected
Version 9.16.4.55
Status affected
Version 9.18.4.22
Status affected
Version 9.20.2.10
Status affected
Version 9.16.4.57
Status affected
Version 9.19.1.28
Status affected
Version 9.17.1.39
Status affected
Version 9.12.4.67
Status affected
Version 9.14.4.24
Status affected
Version 9.18.4.24
Status affected
Version 9.20.2.21
Status affected
Version 9.16.4.61
Status affected
Version 9.19.1.31
Status affected
Version 9.18.4.29
Status affected
Version 9.20.2.22
Status affected
Version 9.16.4.62
Status affected
Version 9.18.4.34
Status affected
Version 9.20.3
Status affected
Version 9.16.4.67
Status affected
Version 9.16.4.70
Status affected
Version 9.18.4.40
Status affected
Version 9.23.1
Status affected
Version 9.22.1.1
Status affected
Version 9.16.4.71
Status affected
Version 9.20.3.4
Status affected
Version 9.18.4.47
Status affected
Version 9.20.3.7
Status affected
Version 9.17.1.45
Status affected
Version 9.19.1.37
Status affected
Version 9.17.1.46
Status affected
Version 9.16.4.76
Status affected
Version 9.20.3.9
Status affected
Version 9.19.1.38
Status affected
Version 9.18.4.50
Status affected
Version 9.22.1.3
Status affected
Version 9.20.3.10
Status affected
Version 9.22.1.2
Status affected
Version 9.18.4.52
Status affected
Version 9.20.3.13
Status affected
Version 9.22.1.6
Status affected
Version 9.18.4.53
Status affected
Version 9.16.4.82
Status affected
VendorCisco
Product Cisco Firepower Threat Defense Software
Default Statusunknown
Version 6.2.3.14
Status affected
Version 6.4.0.1
Status affected
Version 6.2.3.7
Status affected
Version 6.2.3
Status affected
Version 6.4.0.2
Status affected
Version 6.2.3.9
Status affected
Version 6.2.3.1
Status affected
Version 6.2.3.2
Status affected
Version 6.4.0.5
Status affected
Version 6.2.3.10
Status affected
Version 6.4.0
Status affected
Version 6.4.0.3
Status affected
Version 6.2.3.6
Status affected
Version 6.4.0.4
Status affected
Version 6.2.3.15
Status affected
Version 6.2.3.5
Status affected
Version 6.2.3.4
Status affected
Version 6.2.3.3
Status affected
Version 6.2.3.8
Status affected
Version 6.4.0.6
Status affected
Version 6.2.3.11
Status affected
Version 6.2.3.12
Status affected
Version 6.2.3.13
Status affected
Version 6.4.0.7
Status affected
Version 6.4.0.8
Status affected
Version 6.6.0
Status affected
Version 6.4.0.9
Status affected
Version 6.2.3.16
Status affected
Version 6.6.0.1
Status affected
Version 6.6.1
Status affected
Version 6.4.0.10
Status affected
Version 6.4.0.11
Status affected
Version 6.6.3
Status affected
Version 6.6.4
Status affected
Version 6.4.0.12
Status affected
Version 7.0.0
Status affected
Version 6.2.3.17
Status affected
Version 7.0.0.1
Status affected
Version 6.6.5
Status affected
Version 7.0.1
Status affected
Version 7.1.0
Status affected
Version 6.4.0.13
Status affected
Version 6.6.5.1
Status affected
Version 6.2.3.18
Status affected
Version 7.0.1.1
Status affected
Version 6.4.0.14
Status affected
Version 7.1.0.1
Status affected
Version 6.6.5.2
Status affected
Version 7.0.2
Status affected
Version 6.4.0.15
Status affected
Version 7.2.0
Status affected
Version 7.0.2.1
Status affected
Version 7.0.3
Status affected
Version 6.6.7
Status affected
Version 7.1.0.2
Status affected
Version 7.2.0.1
Status affected
Version 7.0.4
Status affected
Version 7.2.1
Status affected
Version 7.0.5
Status affected
Version 6.4.0.16
Status affected
Version 7.3.0
Status affected
Version 7.2.2
Status affected
Version 7.2.3
Status affected
Version 6.6.7.1
Status affected
Version 7.3.1
Status affected
Version 7.1.0.3
Status affected
Version 7.2.4
Status affected
Version 7.0.6
Status affected
Version 7.2.5
Status affected
Version 7.2.4.1
Status affected
Version 7.3.1.1
Status affected
Version 7.4.0
Status affected
Version 6.4.0.17
Status affected
Version 7.0.6.1
Status affected
Version 7.2.5.1
Status affected
Version 7.4.1
Status affected
Version 7.2.6
Status affected
Version 7.0.6.2
Status affected
Version 7.4.1.1
Status affected
Version 6.6.7.2
Status affected
Version 6.4.0.18
Status affected
Version 7.2.7
Status affected
Version 7.2.5.2
Status affected
Version 7.3.1.2
Status affected
Version 7.2.8
Status affected
Version 7.6.0
Status affected
Version 7.4.2
Status affected
Version 7.2.8.1
Status affected
Version 7.0.6.3
Status affected
Version 7.4.2.1
Status affected
Version 7.2.9
Status affected
Version 7.0.7
Status affected
Version 7.7.0
Status affected
Version 7.4.2.2
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.17% 0.385
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
psirt@cisco.com 8.5 3.1 4.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
CWE-1287 Improper Validation of Specified Type of Input

The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.