6.5

CVE-2025-20362

Warning
Media report

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication.

 This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.

Data is provided by the National Vulnerability Database (NVD)
CiscoAdaptive Security Appliance Software Version >= 9.12 < 9.12.4.72
CiscoAdaptive Security Appliance Software Version >= 9.14 < 9.14.4.28
CiscoAdaptive Security Appliance Software Version >= 9.16 < 9.16.4.85
CiscoAdaptive Security Appliance Software Version >= 9.17.0 < 9.18.4.67
CiscoAdaptive Security Appliance Software Version >= 9.19 < 9.20.4.10
CiscoAdaptive Security Appliance Software Version >= 9.22 < 9.22.2.14
CiscoAdaptive Security Appliance Software Version >= 9.23 < 9.23.1.19
CiscoFirepower Threat Defense Version >= 7.0.0 < 7.0.8.1
CiscoFirepower Threat Defense Version >= 7.1.0 < 7.2.10.2
CiscoFirepower Threat Defense Version >= 7.3.0 < 7.4.2.4
CiscoFirepower Threat Defense Version >= 7.6.0 < 7.6.2.1
CiscoFirepower Threat Defense Version >= 7.7.0 < 7.7.10.1

25.09.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability

Vulnerability

Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.

Description

The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor’s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 7.37% 0.913
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
psirt@cisco.com 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.