CVE-2025-20333
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
25/09/2025
Last modified:
28/10/2025
Description
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device.<br />
<br />
This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device.
Impact
Base Score 3.x
9.90
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.12 (including) | 9.12.4.72 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.14 (including) | 9.14.4.28 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.16 (including) | 9.16.4.85 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.17.0 (including) | 9.17.1.45 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.18 (including) | 9.18.4.47 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.19 (including) | 9.19.1.37 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.20 (including) | 9.20.3.7 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.22 (including) | 9.22.1.3 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | 7.0.0 (including) | 7.0.8.1 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | 7.1.0 (including) | 7.2.9 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | 7.3.0 (including) | 7.4.2.4 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:7.6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



