CVE-2025-20362
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/09/2025
Last modified:
06/11/2025
Description
Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory.<br />
<br />
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication.<br />
<br />
This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.12 (including) | 9.12.4.72 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.14 (including) | 9.14.4.28 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.16 (including) | 9.16.4.85 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.17.0 (including) | 9.18.4.67 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.19 (including) | 9.20.4.10 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.22 (including) | 9.22.2.14 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.23 (including) | 9.23.1.19 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | 7.0.0 (including) | 7.0.8.1 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | 7.1.0 (including) | 7.2.10.2 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | 7.3.0 (including) | 7.4.2.4 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | 7.6.0 (including) | 7.6.2.1 (excluding) |
| cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | 7.7.0 (including) | 7.7.10.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



