6.5

CVE-2025-20362

Warnung
Medienbericht

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication.

 This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoAdaptive Security Appliance Software Version >= 9.12 < 9.12.4.72
CiscoAdaptive Security Appliance Software Version >= 9.14 < 9.14.4.28
CiscoAdaptive Security Appliance Software Version >= 9.16 < 9.16.4.85
CiscoAdaptive Security Appliance Software Version >= 9.17.0 < 9.18.4.67
CiscoAdaptive Security Appliance Software Version >= 9.19 < 9.20.4.10
CiscoAdaptive Security Appliance Software Version >= 9.22 < 9.22.2.14
CiscoAdaptive Security Appliance Software Version >= 9.23 < 9.23.1.19
CiscoFirepower Threat Defense Version >= 7.0.0 < 7.0.8.1
CiscoFirepower Threat Defense Version >= 7.1.0 < 7.2.10.2
CiscoFirepower Threat Defense Version >= 7.3.0 < 7.4.2.4
CiscoFirepower Threat Defense Version >= 7.6.0 < 7.6.2.1
CiscoFirepower Threat Defense Version >= 7.7.0 < 7.7.10.1

25.09.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability

Schwachstelle

Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.

Beschreibung

The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor’s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1% 0.762
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.