Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ncsc-2025-0264
Vulnerability from csaf_ncscnl
Published
2025-08-15 08:52
Modified
2025-08-15 08:52
Summary
Kwetsbaarheden verholpen in Cisco Secure Firewall Software
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Secure Firewall Software (inclusief ASA en FTD).
Interpretaties
De kwetsbaarheden bevinden zich in de manier waarop Cisco Secure Firewall de sleutel uitwisseling afhandeld (IKEv2), hiermee is het mogelijk voor een ongeauthenticeerde aanvaller om een Denial-of-Service aanval uit te voeren. De kwetsbaarheid met kenmerk CVE-2025-20265 bevind zich in de implementatie van het RADIUS-subsysteem, hierdoor is het mogelijk voor een ongeauthenticeerde kwaadwillende om willekeurige commando's uit te voeren op het onderliggende systeem.
Oplossingen
Cisco heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-146
Improper Neutralization of Expression/Command Delimiters
CWE-1244
Internal Asset Exposed to Unsafe Debug Access Level or State
CWE-643
Improper Neutralization of Data within XPath Expressions ('XPath Injection')
CWE-1287
Improper Validation of Specified Type of Input
CWE-229
Improper Handling of Values
CWE-415
Double Free
CWE-680
Integer Overflow to Buffer Overflow
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-404
Improper Resource Shutdown or Release
CWE-862
Missing Authorization
CWE-284
Improper Access Control
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-20
Improper Input Validation
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Secure Firewall Software (inclusief ASA en FTD).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden bevinden zich in de manier waarop Cisco Secure Firewall de sleutel uitwisseling afhandeld (IKEv2), hiermee is het mogelijk voor een ongeauthenticeerde aanvaller om een Denial-of-Service aanval uit te voeren. De kwetsbaarheid met kenmerk CVE-2025-20265 bevind zich in de implementatie van het RADIUS-subsysteem, hierdoor is het mogelijk voor een ongeauthenticeerde kwaadwillende om willekeurige commando\u0027s uit te voeren op het onderliggende systeem.", "title": "Interpretaties" }, { "category": "description", "text": "Cisco heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Neutralization of Expression/Command Delimiters", "title": "CWE-146" }, { "category": "general", "text": "Internal Asset Exposed to Unsafe Debug Access Level or State", "title": "CWE-1244" }, { "category": "general", "text": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)", "title": "CWE-643" }, { "category": "general", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" }, { "category": "general", "text": "Improper Handling of Values", "title": "CWE-229" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75415" } ], "title": "Kwetsbaarheden verholpen in Cisco Secure Firewall Software", "tracking": { "current_release_date": "2025-08-15T08:52:41.012811Z", "generator": { "date": "2025-08-04T16:30:00Z", "engine": { "name": "V.A.", "version": "1.2" } }, "id": "NCSC-2025-0264", "initial_release_date": "2025-08-15T08:52:41.012811Z", "revision_history": [ { "date": "2025-08-15T08:52:41.012811Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cisco/unknown", "product": { "name": "vers:cisco/unknown", "product_id": "CSAFPID-3054139" } } ], "category": "product_name", "name": "Cisco Firepower Management Center Appliances" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/7.7.0", "product": { "name": "vers:unknown/7.7.0", "product_id": "CSAFPID-3053803" } } ], "category": "product_name", "name": "Cisco Firepower Threat Defense Software" }, { "branches": [ { "category": "product_version_range", "name": "vers:cisco/unknown", "product": { "name": "vers:cisco/unknown", "product_id": "CSAFPID-1753655" } } ], "category": "product_name", "name": "Cisco Secure Firewall 3100 Series" }, { "branches": [ { "category": "product_version_range", "name": "vers:cisco/unknown", "product": { "name": "vers:cisco/unknown", "product_id": "CSAFPID-1753671" } } ], "category": "product_name", "name": "Cisco Secure Firewall 4200 Series" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/9.23.1", "product": { "name": "vers:unknown/9.23.1", "product_id": "CSAFPID-3053795" } } ], "category": "product_name", "name": "Cisco Adaptive Security Appliance (ASA) Software" }, { "branches": [ { "category": "product_version_range", "name": "vers:cisco/unknown", "product": { "name": "vers:cisco/unknown", "product_id": "CSAFPID-2818039" } } ], "category": "product_name", "name": "Cisco Adaptive Security Virtual Appliance (ASAv)" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-20127", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20127 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20127.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20127" }, { "cve": "CVE-2025-20133", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20133 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20133" }, { "cve": "CVE-2025-20134", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20134 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20134.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20134" }, { "cve": "CVE-2025-20135", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20135 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20135.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20135" }, { "cve": "CVE-2025-20136", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20136 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20136.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20136" }, { "cve": "CVE-2025-20148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20148 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20148.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20148" }, { "cve": "CVE-2025-20217", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20217 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20217.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20217" }, { "cve": "CVE-2025-20218", "cwe": { "id": "CWE-643", "name": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)", "title": "CWE-643" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20218 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20218.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20218" }, { "cve": "CVE-2025-20219", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20219 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20219" }, { "cve": "CVE-2025-20220", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20220 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20220.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20220" }, { "cve": "CVE-2025-20222", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20222 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20222.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20222" }, { "cve": "CVE-2025-20224", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20224 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20224.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20224" }, { "cve": "CVE-2025-20225", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20225 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20225.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20225" }, { "cve": "CVE-2025-20235", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20235 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20235.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20235" }, { "cve": "CVE-2025-20237", "cwe": { "id": "CWE-146", "name": "Improper Neutralization of Expression/Command Delimiters" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Expression/Command Delimiters", "title": "CWE-146" }, { "category": "other", "text": "Internal Asset Exposed to Unsafe Debug Access Level or State", "title": "CWE-1244" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20237 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20237.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20237" }, { "cve": "CVE-2025-20238", "cwe": { "id": "CWE-1244", "name": "Internal Asset Exposed to Unsafe Debug Access Level or State" }, "notes": [ { "category": "other", "text": "Internal Asset Exposed to Unsafe Debug Access Level or State", "title": "CWE-1244" }, { "category": "other", "text": "Improper Neutralization of Expression/Command Delimiters", "title": "CWE-146" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20238 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20238.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20238" }, { "cve": "CVE-2025-20239", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20239 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20239.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20239" }, { "cve": "CVE-2025-20243", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20243 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20243.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20243" }, { "cve": "CVE-2025-20244", "cwe": { "id": "CWE-1287", "name": "Improper Validation of Specified Type of Input" }, "notes": [ { "category": "other", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20244 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20244.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20244" }, { "cve": "CVE-2025-20251", "cwe": { "id": "CWE-1287", "name": "Improper Validation of Specified Type of Input" }, "notes": [ { "category": "other", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20251 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20251" }, { "cve": "CVE-2025-20252", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20252 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20252.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20252" }, { "cve": "CVE-2025-20253", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20253 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20253.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20253" }, { "cve": "CVE-2025-20254", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20254 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20254.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20254" }, { "cve": "CVE-2025-20263", "cwe": { "id": "CWE-680", "name": "Integer Overflow to Buffer Overflow" }, "notes": [ { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20263 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20263.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20263" }, { "cve": "CVE-2025-20265", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20265 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20265.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20265" }, { "cve": "CVE-2025-20268", "cwe": { "id": "CWE-229", "name": "Improper Handling of Values" }, "notes": [ { "category": "other", "text": "Improper Handling of Values", "title": "CWE-229" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20268 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20268.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20268" }, { "cve": "CVE-2025-20301", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20301 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20301.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20301" }, { "cve": "CVE-2025-20302", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20302 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20302.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20302" }, { "cve": "CVE-2025-20306", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20306 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20306.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-3054139", "CSAFPID-3053803", "CSAFPID-1753655", "CSAFPID-1753671", "CSAFPID-3053795", "CSAFPID-2818039" ] } ], "title": "CVE-2025-20306" } ] }
CVE-2025-20222 (GCVE-0-2025-20222)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
A vulnerability in the RADIUS proxy feature for the IPsec VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper processing of IPv6 packets. An attacker could exploit this vulnerability by sending IPv6 packets over an IPsec VPN connection to an affected device. A successful exploit could allow the attacker to trigger a reload of the device, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: 6.2.3 Version: 6.2.3.9 Version: 6.2.3.1 Version: 6.2.3.2 Version: 6.2.3.10 Version: 6.4.0 Version: 6.4.0.3 Version: 6.4.0.4 Version: 6.2.3.15 Version: 6.2.3.6 Version: 6.2.3.7 Version: 6.2.3.12 Version: 6.2.3.3 Version: 6.2.3.11 Version: 6.4.0.6 Version: 6.2.3.13 Version: 6.2.3.8 Version: 6.2.3.4 Version: 6.4.0.1 Version: 6.2.3.5 Version: 6.4.0.5 Version: 6.2.3.14 Version: 6.4.0.2 Version: 6.4.0.8 Version: 6.4.0.7 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.6.3 Version: 6.6.4 Version: 6.4.0.12 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.4.0.13 Version: 6.6.5.1 Version: 6.2.3.18 Version: 7.0.1.1 Version: 6.4.0.14 Version: 7.1.0.1 Version: 6.6.5.2 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.2.3 Version: 7.3.1 Version: 7.1.0.3 Version: 7.2.4 Version: 7.0.6 Version: 7.2.5 Version: 7.2.4.1 Version: 7.3.1.1 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.0.6.2 Version: 7.4.1.1 Version: 6.6.7.2 Version: 6.4.0.18 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.4.2 Version: 7.2.8.1 Version: 7.0.6.3 Version: 7.4.2.1 Version: 7.2.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20222", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:40:26.451129Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:20:51.658Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the RADIUS proxy feature for the IPsec VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper processing of IPv6 packets. An attacker could exploit this vulnerability by sending IPv6 packets over an IPsec VPN connection to\u0026nbsp;an affected device. A successful exploit could allow the attacker to trigger a reload of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:43.365Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fp2k-IPsec-dos-tjwgdZCO", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO" } ], "source": { "advisory": "cisco-sa-fp2k-IPsec-dos-tjwgdZCO", "defects": [ "CSCwm95070" ], "discovery": "EXTERNAL" }, "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Buffer Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20222", "datePublished": "2025-08-14T16:28:43.365Z", "dateReserved": "2024-10-10T19:15:13.235Z", "dateUpdated": "2025-08-14T19:20:51.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20133 (GCVE-0-2025-20133)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
A vulnerability in the management and VPN web servers of the Remote Access SSL VPN feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly stop responding, resulting in a DoS condition.
This vulnerability is due to ineffective validation of user-supplied input during the Remote Access SSL VPN authentication process. An attacker could exploit this vulnerability by sending a crafted request to the VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition where the device stops responding to Remote Access SSL VPN authentication requests.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.8.3 Version: 9.12.1 Version: 9.12.2 Version: 9.8.2.45 Version: 9.8.4 Version: 9.14.1 Version: 9.12.4 Version: 9.8.2.35 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.38 Version: 9.8.4.25 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.8.3.18 Version: 9.8.3.14 Version: 9.8.4.15 Version: 9.8.4.8 Version: 9.8.3.29 Version: 9.14.1.10 Version: 9.12.2.5 Version: 9.8.4.22 Version: 9.12.3.12 Version: 9.8.4.7 Version: 9.8.4.17 Version: 9.8.3.16 Version: 9.8.4.20 Version: 9.8.3.11 Version: 9.12.1.3 Version: 9.8.4.3 Version: 9.12.2.4 Version: 9.8.4.12 Version: 9.12.1.2 Version: 9.8.3.26 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.8.3.21 Version: 9.8.4.10 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.14.1.6 Version: 9.8.3.8 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.8.4.26 Version: 9.12.4.4 Version: 9.14.1.30 Version: 9.8.4.29 Version: 9.12.4.7 Version: 9.14.2 Version: 9.12.4.8 Version: 9.8.4.32 Version: 9.12.4.10 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.12.4.13 Version: 9.8.4.33 Version: 9.14.2.13 Version: 9.8.4.34 Version: 9.12.4.18 Version: 9.8.4.35 Version: 9.14.2.15 Version: 9.12.4.24 Version: 9.16.1 Version: 9.8.4.39 Version: 9.14.3 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.14.3.1 Version: 9.12.4.29 Version: 9.14.3.9 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.8.4.40 Version: 9.14.3.11 Version: 9.12.4.35 Version: 9.8.4.41 Version: 9.15.1.1 Version: 9.14.3.13 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.14.3.15 Version: 9.17.1 Version: 9.16.2.11 Version: 9.14.3.18 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.8.4.43 Version: 9.14.4 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.14.4.6 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.8.4.44 Version: 9.18.1 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.17.1.15 Version: 9.8.4.45 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.8.4.46 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.14.4.22 Version: 9.16.4.14 Version: 9.8.4.48 Version: 9.18.3 Version: 9.19.1.5 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.16.4.18 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.14.4.24 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.20.3 Version: 9.17.1.45 Version: 9.19.1.37 Version: 9.17.1.46 Version: 9.19.1.38 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20133", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:41:58.090292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:21:45.739Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.15.1.1" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.19.1.38" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.4.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the management and VPN web servers of the Remote Access SSL VPN feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly stop responding, resulting in a DoS condition.\r\n\r\nThis vulnerability is due to ineffective validation of user-supplied input during the Remote Access SSL VPN authentication process. An attacker could exploit this vulnerability by sending a crafted request to the VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition where the device stops responding to Remote Access SSL VPN authentication requests." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:07.783Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-vpn-dos-mfPekA6e", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e" } ], "source": { "advisory": "cisco-sa-asaftd-vpn-dos-mfPekA6e", "defects": [ "CSCwk44165" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20133", "datePublished": "2025-08-14T16:28:07.783Z", "dateReserved": "2024-10-10T19:15:13.212Z", "dateUpdated": "2025-08-14T19:21:45.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20219 (GCVE-0-2025-20219)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 20:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
A vulnerability in the implementation of access control rules for loopback interfaces in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to send traffic that should have been blocked to a loopback interface.
This vulnerability is due to improper enforcement of access control rules for loopback interfaces. An attacker could exploit this vulnerability by sending traffic to a loopback interface on an affected device. A successful exploit could allow the attacker to bypass configured access control rules and send traffic that should have been blocked to a loopback interface on the device.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.18.2 Version: 9.18.2.5 Version: 9.18.2.7 Version: 9.19.1 Version: 9.18.2.8 Version: 9.18.3 Version: 9.19.1.5 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.18.3.56 Version: 9.20.1 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.19.1.28 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.18.4.34 Version: 9.20.3 Version: 9.18.4.40 Version: 9.22.1.1 Version: 9.20.3.4 Version: 9.18.4.47 Version: 9.20.3.7 Version: 9.19.1.37 Version: 9.20.3.9 Version: 9.19.1.38 Version: 9.18.4.50 Version: 9.22.1.2 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20219", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T20:44:20.753964Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T20:44:27.252Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.22.1.2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of access control rules for loopback interfaces in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to send traffic that should have been blocked to a loopback interface.\r\n\r\nThis vulnerability is due to improper enforcement of access control rules for loopback interfaces. An attacker could exploit this vulnerability by sending traffic to a loopback interface on an affected device. A successful exploit could allow the attacker to bypass configured access control rules and send traffic\u0026nbsp;that should have been blocked to a loopback interface on the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:40.010Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asa-ftd-acl-bypass-mtPze9Yh", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-acl-bypass-mtPze9Yh" } ], "source": { "advisory": "cisco-sa-asa-ftd-acl-bypass-mtPze9Yh", "defects": [ "CSCwi57783" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20219", "datePublished": "2025-08-14T16:28:40.010Z", "dateReserved": "2024-10-10T19:15:13.233Z", "dateUpdated": "2025-08-14T20:44:27.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20135 (GCVE-0-2025-20135)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
A vulnerability in the DHCP client functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to exhaust available memory.
This vulnerability is due to improper validation of incoming DHCP packets. An attacker could exploit this vulnerability by repeatedly sending crafted DHCPv4 packets to an affected device. A successful exploit could allow the attacker to exhaust available memory, which would affect availability of services and prevent new processes from starting, resulting in a Denial of Service (DoS) condition that would require a manual reboot.
Note: On Cisco Secure FTD Software, this vulnerability does not affect management interfaces.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.8.3 Version: 9.12.1 Version: 9.8.1 Version: 9.12.2 Version: 9.8.2.45 Version: 9.8.2 Version: 9.8.4 Version: 9.14.1 Version: 9.12.4 Version: 9.8.2.26 Version: 9.8.2.24 Version: 9.8.2.15 Version: 9.8.2.14 Version: 9.8.2.35 Version: 9.8.2.20 Version: 9.8.2.8 Version: 9.8.2.17 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.38 Version: 9.8.4.25 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.8.3.18 Version: 9.8.3.14 Version: 9.8.4.15 Version: 9.8.4.8 Version: 9.8.1.7 Version: 9.8.3.29 Version: 9.14.1.10 Version: 9.12.2.5 Version: 9.8.4.22 Version: 9.12.3.12 Version: 9.8.4.7 Version: 9.8.4.17 Version: 9.8.3.16 Version: 9.8.4.20 Version: 9.8.3.11 Version: 9.12.1.3 Version: 9.8.4.3 Version: 9.12.2.4 Version: 9.8.4.12 Version: 9.12.1.2 Version: 9.8.3.26 Version: 9.8.1.5 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.8.3.21 Version: 9.8.4.10 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.14.1.6 Version: 9.8.3.8 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.8.4.26 Version: 9.12.4.4 Version: 9.14.1.30 Version: 9.8.4.29 Version: 9.12.4.7 Version: 9.14.2 Version: 9.12.4.8 Version: 9.8.4.32 Version: 9.12.4.10 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.12.4.13 Version: 9.8.4.33 Version: 9.14.2.13 Version: 9.8.4.34 Version: 9.12.4.18 Version: 9.8.4.35 Version: 9.14.2.15 Version: 9.12.4.24 Version: 9.16.1 Version: 9.8.4.39 Version: 9.14.3 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.14.3.1 Version: 9.12.4.29 Version: 9.14.3.9 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.8.4.40 Version: 9.14.3.11 Version: 9.12.4.35 Version: 9.8.4.41 Version: 9.15.1.1 Version: 9.14.3.13 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.14.3.15 Version: 9.17.1 Version: 9.16.2.11 Version: 9.14.3.18 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.8.4.43 Version: 9.14.4 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.14.4.6 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.8.4.44 Version: 9.18.1 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.17.1.15 Version: 9.8.4.45 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.8.4.46 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.14.4.22 Version: 9.16.4.14 Version: 9.8.4.48 Version: 9.18.3 Version: 9.19.1.5 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.16.4.18 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.14.4.24 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.18.4.34 Version: 9.20.3 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.18.4.40 Version: 9.22.1.1 Version: 9.16.4.71 Version: 9.20.3.4 Version: 9.18.4.47 Version: 9.17.1.45 Version: 9.19.1.37 Version: 9.17.1.46 Version: 9.19.1.38 Version: 9.22.1.2 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20135", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:41:32.287677Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:21:28.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.15.1.1" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.22.1.2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the DHCP client functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to exhaust available memory.\r\n\r\nThis vulnerability is due to improper validation of incoming DHCP packets. An attacker could exploit this vulnerability by repeatedly sending crafted DHCPv4 packets to an affected device. A successful exploit could allow the attacker to exhaust available memory, which would affect availability of services and prevent new processes from starting, resulting in a Denial of Service (DoS) condition that would require a manual reboot.\r\nNote: On Cisco Secure FTD Software, this vulnerability does not affect management interfaces." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:16.508Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-dhcp-qj7nGs4N", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dhcp-qj7nGs4N" } ], "source": { "advisory": "cisco-sa-asaftd-dhcp-qj7nGs4N", "defects": [ "CSCwm08235" ], "discovery": "INTERNAL" }, "title": "Cisco Adaptive Security Appliance and Firepower Threat Defense Software DHCP Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20135", "datePublished": "2025-08-14T16:28:16.508Z", "dateReserved": "2024-10-10T19:15:13.213Z", "dateUpdated": "2025-08-14T19:21:28.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20251 (GCVE-0-2025-20251)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-14 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1287 - Improper Validation of Specified Type of Input
Summary
A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to create or delete arbitrary files on the underlying operating system. If critical system files are manipulated, new Remote Access SSL VPN sessions could be denied and existing sessions could be dropped, causing a denial of service (DoS) condition. An exploited device requires a manual reboot to recover.
This vulnerability is due to insufficient input validation when processing HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to create or delete files on the underlying operating system, which could cause the Remote Access SSL VPN service to become unresponsive.
To exploit this vulnerability, the attacker must be authenticated as a VPN user of the affected device.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.8.3 Version: 9.12.1 Version: 9.8.1 Version: 9.12.2 Version: 9.8.2.45 Version: 9.8.2 Version: 9.8.4 Version: 9.14.1 Version: 9.12.4 Version: 9.8.2.26 Version: 9.8.2.24 Version: 9.8.2.15 Version: 9.8.2.14 Version: 9.8.2.35 Version: 9.8.2.20 Version: 9.8.2.8 Version: 9.8.2.17 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.38 Version: 9.8.4.25 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.8.3.18 Version: 9.8.3.14 Version: 9.8.4.15 Version: 9.8.4.8 Version: 9.8.1.7 Version: 9.8.3.29 Version: 9.14.1.10 Version: 9.12.2.5 Version: 9.8.4.22 Version: 9.12.3.12 Version: 9.8.4.7 Version: 9.8.4.17 Version: 9.8.3.16 Version: 9.8.4.20 Version: 9.8.3.11 Version: 9.12.1.3 Version: 9.8.4.3 Version: 9.12.2.4 Version: 9.8.4.12 Version: 9.12.1.2 Version: 9.8.3.26 Version: 9.8.1.5 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.8.3.21 Version: 9.8.4.10 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.14.1.6 Version: 9.8.3.8 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.8.4.26 Version: 9.12.4.4 Version: 9.14.1.30 Version: 9.8.4.29 Version: 9.12.4.7 Version: 9.14.2 Version: 9.12.4.8 Version: 9.8.4.32 Version: 9.12.4.10 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.12.4.13 Version: 9.8.4.33 Version: 9.14.2.13 Version: 9.8.4.34 Version: 9.12.4.18 Version: 9.8.4.35 Version: 9.14.2.15 Version: 9.12.4.24 Version: 9.16.1 Version: 9.8.4.39 Version: 9.14.3 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.14.3.1 Version: 9.12.4.29 Version: 9.14.3.9 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.8.4.40 Version: 9.14.3.11 Version: 9.12.4.35 Version: 9.8.4.41 Version: 9.14.3.13 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.14.3.15 Version: 9.17.1 Version: 9.16.2.11 Version: 9.14.3.18 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.8.4.43 Version: 9.14.4 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.14.4.6 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.8.4.44 Version: 9.18.1 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.17.1.15 Version: 9.8.4.45 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.8.4.46 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.14.4.22 Version: 9.16.4.14 Version: 9.8.4.48 Version: 9.18.3 Version: 9.19.1.5 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.16.4.18 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.14.4.24 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.18.4.34 Version: 9.20.3 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.18.4.40 Version: 9.23.1 Version: 9.22.1.1 Version: 9.16.4.71 Version: 9.20.3.4 Version: 9.18.4.47 Version: 9.20.3.7 Version: 9.17.1.45 Version: 9.19.1.37 Version: 9.17.1.46 Version: 9.16.4.76 Version: 9.20.3.9 Version: 9.19.1.38 Version: 9.18.4.50 Version: 9.22.1.3 Version: 9.20.3.10 Version: 9.22.1.2 Version: 9.18.4.52 Version: 9.20.3.13 Version: 9.22.1.6 Version: 9.18.4.53 Version: 9.16.4.82 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20251", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:38:33.161196Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:19:38.255Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.23.1" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.16.4.82" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.7.0" }, { "status": "affected", "version": "7.4.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to create or delete arbitrary files on the underlying operating system. If critical system files are manipulated, new Remote Access SSL VPN sessions could be denied and existing sessions could be dropped, causing a denial of service (DoS) condition. An exploited device requires a manual reboot to recover.\r\n\r\nThis vulnerability is due to insufficient input validation when processing HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to create or delete files on the underlying operating system, which could cause the Remote Access SSL VPN service to become unresponsive.\r\nTo exploit this vulnerability, the attacker must be authenticated as a VPN user of the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1287", "description": "Improper Validation of Specified Type of Input", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:29:30.416Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-http-file-hUyX2jL4", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4" } ], "source": { "advisory": "cisco-sa-asaftd-http-file-hUyX2jL4", "defects": [ "CSCwo00880" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Adaptive Security Appliance and Cisco Secure Firewall Threat Defense Software Authenticated Arbitrary File Deletion" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20251", "datePublished": "2025-08-14T16:29:30.416Z", "dateReserved": "2024-10-10T19:15:13.240Z", "dateUpdated": "2025-08-14T19:19:38.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20218 (GCVE-0-2025-20218)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-643 - Improper Neutralization of Data within XPath Expressions ('XPath Injection')
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device.
To exploit this vulnerability, the attacker must have valid administrative credentials.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.6.3 Version: 6.6.4 Version: 6.4.0.12 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 6.6.5.1 Version: 6.4.0.13 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.0.6.2 Version: 6.4.0.18 Version: 6.6.7.2 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.4.2 Version: 7.2.8.1 Version: 7.0.6.3 Version: 7.4.2.1 Version: 7.2.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20218", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:40:39.680564Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:20:58.856Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Management Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.2.3.1" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device.\r\n\r\nThis vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device.\r\nTo exploit this vulnerability, the attacker must have valid administrative credentials." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-643", "description": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:33.831Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fmc-xpathinj-COrThdMb", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xpathinj-COrThdMb" } ], "source": { "advisory": "cisco-sa-fmc-xpathinj-COrThdMb", "defects": [ "CSCwj06006" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firepower Management Center Software XPATH Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20218", "datePublished": "2025-08-14T16:28:33.831Z", "dateReserved": "2024-10-10T19:15:13.233Z", "dateUpdated": "2025-08-14T19:20:58.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20237 (GCVE-0-2025-20237)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-15 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-146 - Improper Neutralization of Expression/Command Delimiters
Summary
A vulnerability in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying operating system as root.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.8.1 Version: 9.8.1.5 Version: 9.8.1.7 Version: 9.8.2 Version: 9.8.2.8 Version: 9.8.2.14 Version: 9.8.2.15 Version: 9.8.2.17 Version: 9.8.2.20 Version: 9.8.2.24 Version: 9.8.2.26 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.35 Version: 9.8.2.38 Version: 9.8.3.8 Version: 9.8.3.11 Version: 9.8.3.14 Version: 9.8.3.16 Version: 9.8.3.18 Version: 9.8.3.21 Version: 9.8.3 Version: 9.8.3.26 Version: 9.8.3.29 Version: 9.8.4 Version: 9.8.4.3 Version: 9.8.4.7 Version: 9.8.4.8 Version: 9.8.4.10 Version: 9.8.4.12 Version: 9.8.4.15 Version: 9.8.4.17 Version: 9.8.2.45 Version: 9.8.4.25 Version: 9.8.4.20 Version: 9.8.4.22 Version: 9.8.4.26 Version: 9.8.4.29 Version: 9.8.4.32 Version: 9.8.4.33 Version: 9.8.4.34 Version: 9.8.4.35 Version: 9.8.4.39 Version: 9.8.4.40 Version: 9.8.4.41 Version: 9.8.4.43 Version: 9.8.4.44 Version: 9.8.4.45 Version: 9.8.4.46 Version: 9.8.4.48 Version: 9.12.1 Version: 9.12.1.2 Version: 9.12.1.3 Version: 9.12.2 Version: 9.12.2.4 Version: 9.12.2.5 Version: 9.12.2.9 Version: 9.12.3 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.12.4 Version: 9.12.3.12 Version: 9.12.3.9 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.12.4.4 Version: 9.12.4.7 Version: 9.12.4.10 Version: 9.12.4.13 Version: 9.12.4.8 Version: 9.12.4.18 Version: 9.12.4.24 Version: 9.12.4.26 Version: 9.12.4.29 Version: 9.12.4.30 Version: 9.12.4.35 Version: 9.12.4.37 Version: 9.12.4.38 Version: 9.12.4.39 Version: 9.12.4.40 Version: 9.12.4.41 Version: 9.12.4.47 Version: 9.12.4.48 Version: 9.12.4.50 Version: 9.12.4.52 Version: 9.12.4.54 Version: 9.12.4.55 Version: 9.12.4.56 Version: 9.12.4.58 Version: 9.12.4.62 Version: 9.12.4.65 Version: 9.12.4.67 Version: 9.14.1 Version: 9.14.1.10 Version: 9.14.1.6 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.14.1.30 Version: 9.14.2 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.14.2.13 Version: 9.14.2.15 Version: 9.14.3 Version: 9.14.3.1 Version: 9.14.3.9 Version: 9.14.3.11 Version: 9.14.3.13 Version: 9.14.3.18 Version: 9.14.3.15 Version: 9.14.4 Version: 9.14.4.6 Version: 9.14.4.7 Version: 9.14.4.12 Version: 9.14.4.13 Version: 9.14.4.14 Version: 9.14.4.15 Version: 9.14.4.17 Version: 9.14.4.22 Version: 9.14.4.23 Version: 9.14.4.24 Version: 9.16.1 Version: 9.16.1.28 Version: 9.16.2 Version: 9.16.2.3 Version: 9.16.2.7 Version: 9.16.2.11 Version: 9.16.2.13 Version: 9.16.2.14 Version: 9.16.3 Version: 9.16.3.3 Version: 9.16.3.14 Version: 9.16.3.15 Version: 9.16.3.19 Version: 9.16.3.23 Version: 9.16.4 Version: 9.16.4.9 Version: 9.16.4.14 Version: 9.16.4.18 Version: 9.16.4.19 Version: 9.16.4.27 Version: 9.16.4.38 Version: 9.16.4.39 Version: 9.16.4.42 Version: 9.16.4.48 Version: 9.16.4.55 Version: 9.16.4.57 Version: 9.16.4.61 Version: 9.16.4.62 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.16.4.71 Version: 9.16.4.76 Version: 9.16.4.82 Version: 9.17.1 Version: 9.17.1.7 Version: 9.17.1.9 Version: 9.17.1.10 Version: 9.17.1.11 Version: 9.17.1.13 Version: 9.17.1.15 Version: 9.17.1.20 Version: 9.17.1.30 Version: 9.17.1.33 Version: 9.17.1.39 Version: 9.17.1.45 Version: 9.17.1.46 Version: 9.18.1 Version: 9.18.1.3 Version: 9.18.2 Version: 9.18.2.5 Version: 9.18.2.7 Version: 9.18.2.8 Version: 9.18.3 Version: 9.18.3.39 Version: 9.18.3.46 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.18.3.56 Version: 9.18.4 Version: 9.18.4.5 Version: 9.18.4.8 Version: 9.18.4.22 Version: 9.18.4.24 Version: 9.18.4.29 Version: 9.18.4.34 Version: 9.18.4.40 Version: 9.18.4.47 Version: 9.18.4.50 Version: 9.18.4.52 Version: 9.18.4.53 Version: 9.19.1 Version: 9.19.1.5 Version: 9.19.1.9 Version: 9.19.1.12 Version: 9.19.1.18 Version: 9.19.1.22 Version: 9.19.1.24 Version: 9.19.1.27 Version: 9.19.1.28 Version: 9.19.1.31 Version: 9.19.1.37 Version: 9.19.1.38 Version: 9.20.1 Version: 9.20.1.5 Version: 9.20.2 Version: 9.20.2.10 Version: 9.20.2.21 Version: 9.20.2.22 Version: 9.20.3 Version: 9.20.3.4 Version: 9.20.3.7 Version: 9.20.3.9 Version: 9.20.3.10 Version: 9.20.3.13 Version: 9.22.1.1 Version: 9.22.1.3 Version: 9.22.1.2 Version: 9.22.1.6 Version: 9.23.1 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20237", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-15T03:55:50.014Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.16.4.82" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.23.1" } ] }, { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r This vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying operating system as root." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-146", "description": "Improper Neutralization of Expression/Command Delimiters", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:44:24.561Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-cmdinj-VEhFeZQ3", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmdinj-VEhFeZQ3" } ], "source": { "advisory": "cisco-sa-asaftd-cmdinj-VEhFeZQ3", "defects": [ "CSCwn90958" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20237", "datePublished": "2025-08-14T16:29:11.186Z", "dateReserved": "2024-10-10T19:15:13.237Z", "dateUpdated": "2025-08-15T03:55:50.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20239 (GCVE-0-2025-20239)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-14 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco IOS Software, IOS XE Software, Secure Firewall Adaptive Security Appliance (ASA) Software, and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.
This vulnerability is due to a lack of proper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. In the case of Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly. In the case of Cisco ASA and FTD Software, a successful exploit could allow the attacker to partially exhaust system memory, causing system instability such as being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | IOS |
Version: 15.2(4)E Version: 15.2(4)E1 Version: 15.2(4)E2 Version: 15.2(5)E Version: 15.2(4)E3 Version: 15.2(5)E1 Version: 15.2(5b)E Version: 15.2(5a)E1 Version: 15.2(4)E4 Version: 15.2(5)E2 Version: 15.2(6)E Version: 15.2(4)E5 Version: 15.2(5)E2c Version: 15.2(6)E0a Version: 15.2(6)E1 Version: 15.2(6)E0c Version: 15.2(4)E6 Version: 15.2(6)E2 Version: 15.2(4)E7 Version: 15.2(7)E Version: 15.2(4)E8 Version: 15.2(6)E2a Version: 15.2(7)E1 Version: 15.2(7)E0a Version: 15.2(7)E0b Version: 15.2(7)E0s Version: 15.2(6)E3 Version: 15.2(4)E9 Version: 15.2(7)E2 Version: 15.2(7a)E0b Version: 15.2(4)E10 Version: 15.2(7)E3 Version: 15.2(7)E1a Version: 15.2(7b)E0b Version: 15.2(4)E10a Version: 15.2(7)E4 Version: 15.2(8)E Version: 15.2(8)E1 Version: 15.2(7)E5 Version: 15.2(7)E6 Version: 15.2(8)E2 Version: 15.2(4)E10d Version: 15.2(7)E7 Version: 15.2(8)E3 Version: 15.2(7)E8 Version: 15.2(8)E4 Version: 15.2(7)E9 Version: 15.2(8)E5 Version: 15.2(8)E6 Version: 15.2(7)E10 Version: 15.2(7)E11 Version: 15.2(8)E7 Version: 15.2(7)E12 Version: 15.5(1)S Version: 15.5(2)S Version: 15.5(1)S1 Version: 15.5(3)S Version: 15.5(1)S2 Version: 15.5(1)S3 Version: 15.5(2)S1 Version: 15.5(2)S2 Version: 15.5(3)S1 Version: 15.5(3)S1a Version: 15.5(2)S3 Version: 15.5(3)S2 Version: 15.5(3)S0a Version: 15.5(3)S3 Version: 15.5(1)S4 Version: 15.5(2)S4 Version: 15.5(3)S4 Version: 15.5(3)S5 Version: 15.5(3)S6 Version: 15.5(3)S6a Version: 15.5(3)S7 Version: 15.5(3)S6b Version: 15.5(3)S8 Version: 15.5(3)S9 Version: 15.5(3)S10 Version: 15.5(3)S9a Version: 15.2(6)EB Version: 15.5(1)T Version: 15.5(1)T1 Version: 15.5(2)T Version: 15.5(1)T2 Version: 15.5(1)T3 Version: 15.5(2)T1 Version: 15.5(2)T2 Version: 15.5(2)T3 Version: 15.5(2)T4 Version: 15.5(1)T4 Version: 15.2(4)EA Version: 15.2(4)EA1 Version: 15.2(5)EA Version: 15.2(4)EA4 Version: 15.2(4)EA5 Version: 15.2(4)EA6 Version: 15.2(4)EA7 Version: 15.2(4)EA8 Version: 15.2(4)EA9 Version: 15.2(4)EA9a Version: 15.5(3)M Version: 15.5(3)M1 Version: 15.5(3)M0a Version: 15.5(3)M2 Version: 15.5(3)M3 Version: 15.5(3)M4 Version: 15.5(3)M4a Version: 15.5(3)M5 Version: 15.5(3)M6 Version: 15.5(3)M7 Version: 15.5(3)M6a Version: 15.5(3)M8 Version: 15.5(3)M9 Version: 15.5(3)M10 Version: 15.5(3)SN Version: 15.6(1)S Version: 15.6(2)S Version: 15.6(2)S1 Version: 15.6(1)S1 Version: 15.6(1)S2 Version: 15.6(2)S2 Version: 15.6(1)S3 Version: 15.6(2)S3 Version: 15.6(1)S4 Version: 15.6(2)S4 Version: 15.6(1)T Version: 15.6(2)T Version: 15.6(1)T0a Version: 15.6(1)T1 Version: 15.6(2)T1 Version: 15.6(1)T2 Version: 15.6(2)T2 Version: 15.6(1)T3 Version: 15.6(2)T3 Version: 15.3(1)SY Version: 15.3(1)SY1 Version: 15.3(1)SY2 Version: 15.6(2)SP Version: 15.6(2)SP1 Version: 15.6(2)SP2 Version: 15.6(2)SP3 Version: 15.6(2)SP4 Version: 15.6(2)SP5 Version: 15.6(2)SP6 Version: 15.6(2)SP7 Version: 15.6(2)SP8 Version: 15.6(2)SP9 Version: 15.6(2)SN Version: 15.6(3)M Version: 15.6(3)M1 Version: 15.6(3)M0a Version: 15.6(3)M1b Version: 15.6(3)M2 Version: 15.6(3)M2a Version: 15.6(3)M3 Version: 15.6(3)M3a Version: 15.6(3)M4 Version: 15.6(3)M5 Version: 15.6(3)M6 Version: 15.6(3)M7 Version: 15.6(3)M6a Version: 15.6(3)M6b Version: 15.6(3)M8 Version: 15.6(3)M9 Version: 15.2(4)EC1 Version: 15.2(4)EC2 Version: 15.3(3)JPC5 Version: 15.4(1)SY Version: 15.4(1)SY1 Version: 15.4(1)SY2 Version: 15.4(1)SY3 Version: 15.4(1)SY4 Version: 15.5(1)SY Version: 15.5(1)SY1 Version: 15.5(1)SY2 Version: 15.5(1)SY3 Version: 15.5(1)SY4 Version: 15.5(1)SY5 Version: 15.5(1)SY6 Version: 15.5(1)SY7 Version: 15.5(1)SY8 Version: 15.5(1)SY9 Version: 15.5(1)SY10 Version: 15.5(1)SY11 Version: 15.5(1)SY12 Version: 15.5(1)SY13 Version: 15.5(1)SY14 Version: 15.5(1)SY15 Version: 15.7(3)M Version: 15.7(3)M1 Version: 15.7(3)M0a Version: 15.7(3)M3 Version: 15.7(3)M2 Version: 15.7(3)M4 Version: 15.7(3)M5 Version: 15.7(3)M4a Version: 15.7(3)M4b Version: 15.7(3)M6 Version: 15.7(3)M7 Version: 15.7(3)M8 Version: 15.7(3)M9 Version: 15.8(3)M Version: 15.8(3)M1 Version: 15.8(3)M0a Version: 15.8(3)M0b Version: 15.8(3)M2 Version: 15.8(3)M1a Version: 15.8(3)M3 Version: 15.8(3)M2a Version: 15.8(3)M4 Version: 15.8(3)M3a Version: 15.8(3)M3b Version: 15.8(3)M5 Version: 15.8(3)M6 Version: 15.8(3)M7 Version: 15.8(3)M8 Version: 15.8(3)M9 Version: 15.9(3)M Version: 15.9(3)M1 Version: 15.9(3)M0a Version: 15.9(3)M2 Version: 15.9(3)M3 Version: 15.9(3)M2a Version: 15.9(3)M3a Version: 15.9(3)M4 Version: 15.9(3)M3b Version: 15.9(3)M5 Version: 15.9(3)M4a Version: 15.9(3)M6 Version: 15.9(3)M7 Version: 15.9(3)M6a Version: 15.9(3)M6b Version: 15.9(3)M8 Version: 15.9(3)M7a Version: 15.9(3)M9 Version: 15.9(3)M8b Version: 15.9(3)M10 Version: 15.9(3)M11 |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20239", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:39:25.980608Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:20:06.666Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "15.2(4)E" }, { "status": "affected", "version": "15.2(4)E1" }, { "status": "affected", "version": "15.2(4)E2" }, { "status": "affected", "version": "15.2(5)E" }, { "status": "affected", "version": "15.2(4)E3" }, { "status": "affected", "version": "15.2(5)E1" }, { "status": "affected", "version": "15.2(5b)E" }, { "status": "affected", "version": "15.2(5a)E1" }, { "status": "affected", "version": "15.2(4)E4" }, { "status": "affected", "version": "15.2(5)E2" }, { "status": "affected", "version": "15.2(6)E" }, { "status": "affected", "version": "15.2(4)E5" }, { "status": "affected", "version": "15.2(5)E2c" }, { "status": "affected", "version": "15.2(6)E0a" }, { "status": "affected", "version": "15.2(6)E1" }, { "status": "affected", "version": "15.2(6)E0c" }, { "status": "affected", "version": "15.2(4)E6" }, { "status": "affected", "version": "15.2(6)E2" }, { "status": "affected", "version": "15.2(4)E7" }, { "status": "affected", "version": "15.2(7)E" }, { "status": "affected", "version": "15.2(4)E8" }, { "status": "affected", "version": "15.2(6)E2a" }, { "status": "affected", "version": "15.2(7)E1" }, { "status": "affected", "version": "15.2(7)E0a" }, { "status": "affected", "version": "15.2(7)E0b" }, { "status": "affected", "version": "15.2(7)E0s" }, { "status": "affected", "version": "15.2(6)E3" }, { "status": "affected", "version": "15.2(4)E9" }, { "status": "affected", "version": "15.2(7)E2" }, { "status": "affected", "version": "15.2(7a)E0b" }, { "status": "affected", "version": "15.2(4)E10" }, { "status": "affected", "version": "15.2(7)E3" }, { "status": "affected", "version": "15.2(7)E1a" }, { "status": "affected", "version": "15.2(7b)E0b" }, { "status": "affected", "version": "15.2(4)E10a" }, { "status": "affected", "version": "15.2(7)E4" }, { "status": "affected", "version": "15.2(8)E" }, { "status": "affected", "version": "15.2(8)E1" }, { "status": "affected", "version": "15.2(7)E5" }, { "status": "affected", "version": "15.2(7)E6" }, { "status": "affected", "version": "15.2(8)E2" }, { "status": "affected", "version": "15.2(4)E10d" }, { "status": "affected", "version": "15.2(7)E7" }, { "status": "affected", "version": "15.2(8)E3" }, { "status": "affected", "version": "15.2(7)E8" }, { "status": "affected", "version": "15.2(8)E4" }, { "status": "affected", "version": "15.2(7)E9" }, { "status": "affected", "version": "15.2(8)E5" }, { "status": "affected", "version": "15.2(8)E6" }, { "status": "affected", "version": "15.2(7)E10" }, { "status": "affected", "version": "15.2(7)E11" }, { "status": "affected", "version": "15.2(8)E7" }, { "status": "affected", "version": "15.2(7)E12" }, { "status": "affected", "version": "15.5(1)S" }, { "status": "affected", "version": "15.5(2)S" }, { "status": "affected", "version": "15.5(1)S1" }, { "status": "affected", "version": "15.5(3)S" }, { "status": "affected", "version": "15.5(1)S2" }, { "status": "affected", "version": "15.5(1)S3" }, { "status": "affected", "version": "15.5(2)S1" }, { "status": "affected", "version": "15.5(2)S2" }, { "status": "affected", "version": "15.5(3)S1" }, { "status": "affected", "version": "15.5(3)S1a" }, { "status": "affected", "version": "15.5(2)S3" }, { "status": "affected", "version": "15.5(3)S2" }, { "status": "affected", "version": "15.5(3)S0a" }, { "status": "affected", "version": "15.5(3)S3" }, { "status": "affected", "version": "15.5(1)S4" }, { "status": "affected", "version": "15.5(2)S4" }, { "status": "affected", "version": "15.5(3)S4" }, { "status": "affected", "version": "15.5(3)S5" }, { "status": "affected", "version": "15.5(3)S6" }, { "status": "affected", "version": "15.5(3)S6a" }, { "status": "affected", "version": "15.5(3)S7" }, { "status": "affected", "version": "15.5(3)S6b" }, { "status": "affected", "version": "15.5(3)S8" }, { "status": "affected", "version": "15.5(3)S9" }, { "status": "affected", "version": "15.5(3)S10" }, { "status": "affected", "version": "15.5(3)S9a" }, { "status": "affected", "version": "15.2(6)EB" }, { "status": "affected", "version": "15.5(1)T" }, { "status": "affected", "version": "15.5(1)T1" }, { "status": "affected", "version": "15.5(2)T" }, { "status": "affected", "version": "15.5(1)T2" }, { "status": "affected", "version": "15.5(1)T3" }, { "status": "affected", "version": "15.5(2)T1" }, { "status": "affected", "version": "15.5(2)T2" }, { "status": "affected", "version": "15.5(2)T3" }, { "status": "affected", "version": "15.5(2)T4" }, { "status": "affected", "version": "15.5(1)T4" }, { "status": "affected", "version": "15.2(4)EA" }, { "status": "affected", "version": "15.2(4)EA1" }, { "status": "affected", "version": "15.2(5)EA" }, { "status": "affected", "version": "15.2(4)EA4" }, { "status": "affected", "version": "15.2(4)EA5" }, { "status": "affected", "version": "15.2(4)EA6" }, { "status": "affected", "version": "15.2(4)EA7" }, { "status": "affected", "version": "15.2(4)EA8" }, { "status": "affected", "version": "15.2(4)EA9" }, { "status": "affected", "version": "15.2(4)EA9a" }, { "status": "affected", "version": "15.5(3)M" }, { "status": "affected", "version": "15.5(3)M1" }, { "status": "affected", "version": "15.5(3)M0a" }, { "status": "affected", "version": "15.5(3)M2" }, { "status": "affected", "version": "15.5(3)M3" }, { "status": "affected", "version": "15.5(3)M4" }, { "status": "affected", "version": "15.5(3)M4a" }, { "status": "affected", "version": "15.5(3)M5" }, { "status": "affected", "version": "15.5(3)M6" }, { "status": "affected", "version": "15.5(3)M7" }, { "status": "affected", "version": "15.5(3)M6a" }, { "status": "affected", "version": "15.5(3)M8" }, { "status": "affected", "version": "15.5(3)M9" }, { "status": "affected", "version": "15.5(3)M10" }, { "status": "affected", "version": "15.5(3)SN" }, { "status": "affected", "version": "15.6(1)S" }, { "status": "affected", "version": "15.6(2)S" }, { "status": "affected", "version": "15.6(2)S1" }, { "status": "affected", "version": "15.6(1)S1" }, { "status": "affected", "version": "15.6(1)S2" }, { "status": "affected", "version": "15.6(2)S2" }, { "status": "affected", "version": "15.6(1)S3" }, { "status": "affected", "version": "15.6(2)S3" }, { "status": "affected", "version": "15.6(1)S4" }, { "status": "affected", "version": "15.6(2)S4" }, { "status": "affected", "version": "15.6(1)T" }, { "status": "affected", "version": "15.6(2)T" }, { "status": "affected", "version": "15.6(1)T0a" }, { "status": "affected", "version": "15.6(1)T1" }, { "status": "affected", "version": "15.6(2)T1" }, { "status": "affected", "version": "15.6(1)T2" }, { "status": "affected", "version": "15.6(2)T2" }, { "status": "affected", "version": "15.6(1)T3" }, { "status": "affected", "version": "15.6(2)T3" }, { "status": "affected", "version": "15.3(1)SY" }, { "status": "affected", "version": "15.3(1)SY1" }, { "status": "affected", "version": "15.3(1)SY2" }, { "status": "affected", "version": "15.6(2)SP" }, { "status": "affected", "version": "15.6(2)SP1" }, { "status": "affected", "version": "15.6(2)SP2" }, { "status": "affected", "version": "15.6(2)SP3" }, { "status": "affected", "version": "15.6(2)SP4" }, { "status": "affected", "version": "15.6(2)SP5" }, { "status": "affected", "version": "15.6(2)SP6" }, { "status": "affected", "version": "15.6(2)SP7" }, { "status": "affected", "version": "15.6(2)SP8" }, { "status": "affected", "version": "15.6(2)SP9" }, { "status": "affected", "version": "15.6(2)SN" }, { "status": "affected", "version": "15.6(3)M" }, { "status": "affected", "version": "15.6(3)M1" }, { "status": "affected", "version": "15.6(3)M0a" }, { "status": "affected", "version": "15.6(3)M1b" }, { "status": "affected", "version": "15.6(3)M2" }, { "status": "affected", "version": "15.6(3)M2a" }, { "status": "affected", "version": "15.6(3)M3" }, { "status": "affected", "version": "15.6(3)M3a" }, { "status": "affected", "version": "15.6(3)M4" }, { "status": "affected", "version": "15.6(3)M5" }, { "status": "affected", "version": "15.6(3)M6" }, { "status": "affected", "version": "15.6(3)M7" }, { "status": "affected", "version": "15.6(3)M6a" }, { "status": "affected", "version": "15.6(3)M6b" }, { "status": "affected", "version": "15.6(3)M8" }, { "status": "affected", "version": "15.6(3)M9" }, { "status": "affected", "version": "15.2(4)EC1" }, { "status": "affected", "version": "15.2(4)EC2" }, { "status": "affected", "version": "15.3(3)JPC5" }, { "status": "affected", "version": "15.4(1)SY" }, { "status": "affected", "version": "15.4(1)SY1" }, { "status": "affected", "version": "15.4(1)SY2" }, { "status": "affected", "version": "15.4(1)SY3" }, { "status": "affected", "version": "15.4(1)SY4" }, { "status": "affected", "version": "15.5(1)SY" }, { "status": "affected", "version": "15.5(1)SY1" }, { "status": "affected", "version": "15.5(1)SY2" }, { "status": "affected", "version": "15.5(1)SY3" }, { "status": "affected", "version": "15.5(1)SY4" }, { "status": "affected", "version": "15.5(1)SY5" }, { "status": "affected", "version": "15.5(1)SY6" }, { "status": "affected", "version": "15.5(1)SY7" }, { "status": "affected", "version": "15.5(1)SY8" }, { "status": "affected", "version": "15.5(1)SY9" }, { "status": "affected", "version": "15.5(1)SY10" }, { "status": "affected", "version": "15.5(1)SY11" }, { "status": "affected", "version": "15.5(1)SY12" }, { "status": "affected", "version": "15.5(1)SY13" }, { "status": "affected", "version": "15.5(1)SY14" }, { "status": "affected", "version": "15.5(1)SY15" }, { "status": "affected", "version": "15.7(3)M" }, { "status": "affected", "version": "15.7(3)M1" }, { "status": "affected", "version": "15.7(3)M0a" }, { "status": "affected", "version": "15.7(3)M3" }, { "status": "affected", "version": "15.7(3)M2" }, { "status": "affected", "version": "15.7(3)M4" }, { "status": "affected", "version": "15.7(3)M5" }, { "status": "affected", "version": "15.7(3)M4a" }, { "status": "affected", "version": "15.7(3)M4b" }, { "status": "affected", "version": "15.7(3)M6" }, { "status": "affected", "version": "15.7(3)M7" }, { "status": "affected", "version": "15.7(3)M8" }, { "status": "affected", "version": "15.7(3)M9" }, { "status": "affected", "version": "15.8(3)M" }, { "status": "affected", "version": "15.8(3)M1" }, { "status": "affected", "version": "15.8(3)M0a" }, { "status": "affected", "version": "15.8(3)M0b" }, { "status": "affected", "version": "15.8(3)M2" }, { "status": "affected", "version": "15.8(3)M1a" }, { "status": "affected", "version": "15.8(3)M3" }, { "status": "affected", "version": "15.8(3)M2a" }, { "status": "affected", "version": "15.8(3)M4" }, { "status": "affected", "version": "15.8(3)M3a" }, { "status": "affected", "version": "15.8(3)M3b" }, { "status": "affected", "version": "15.8(3)M5" }, { "status": "affected", "version": "15.8(3)M6" }, { "status": "affected", "version": "15.8(3)M7" }, { "status": "affected", "version": "15.8(3)M8" }, { "status": "affected", "version": "15.8(3)M9" }, { "status": "affected", "version": "15.9(3)M" }, { "status": "affected", "version": "15.9(3)M1" }, { "status": "affected", "version": "15.9(3)M0a" }, { "status": "affected", "version": "15.9(3)M2" }, { "status": "affected", "version": "15.9(3)M3" }, { "status": "affected", "version": "15.9(3)M2a" }, { "status": "affected", "version": "15.9(3)M3a" }, { "status": "affected", "version": "15.9(3)M4" }, { "status": "affected", "version": "15.9(3)M3b" }, { "status": "affected", "version": "15.9(3)M5" }, { "status": "affected", "version": "15.9(3)M4a" }, { "status": "affected", "version": "15.9(3)M6" }, { "status": "affected", "version": "15.9(3)M7" }, { "status": "affected", "version": "15.9(3)M6a" }, { "status": "affected", "version": "15.9(3)M6b" }, { "status": "affected", "version": "15.9(3)M8" }, { "status": "affected", "version": "15.9(3)M7a" }, { "status": "affected", "version": "15.9(3)M9" }, { "status": "affected", "version": "15.9(3)M8b" }, { "status": "affected", "version": "15.9(3)M10" }, { "status": "affected", "version": "15.9(3)M11" } ] }, { "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.16.4.82" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.23.1" } ] }, { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.14.0S" }, { "status": "affected", "version": "3.14.1S" }, { "status": "affected", "version": "3.14.2S" }, { "status": "affected", "version": "3.14.3S" }, { "status": "affected", "version": "3.14.4S" }, { "status": "affected", "version": "3.15.0S" }, { "status": "affected", "version": "3.15.1S" }, { "status": "affected", "version": "3.15.2S" }, { "status": "affected", "version": "3.15.1cS" }, { "status": "affected", "version": "3.15.3S" }, { "status": "affected", "version": "3.15.4S" }, { "status": "affected", "version": "3.16.0S" }, { "status": "affected", "version": "3.16.1S" }, { "status": "affected", "version": "3.16.1aS" }, { "status": "affected", "version": "3.16.2S" }, { "status": "affected", "version": "3.16.2aS" }, { "status": "affected", "version": "3.16.0cS" }, { "status": "affected", "version": "3.16.3S" }, { "status": "affected", "version": "3.16.2bS" }, { "status": "affected", "version": "3.16.3aS" }, { "status": "affected", "version": "3.16.4S" }, { "status": "affected", "version": "3.16.4aS" }, { "status": "affected", "version": "3.16.4bS" }, { "status": "affected", "version": "3.16.5S" }, { "status": "affected", "version": "3.16.4dS" }, { "status": "affected", "version": "3.16.6S" }, { "status": "affected", "version": "3.16.7S" }, { "status": "affected", "version": "3.16.6bS" }, { "status": "affected", "version": "3.16.7aS" }, { "status": "affected", "version": "3.16.7bS" }, { "status": "affected", "version": "3.16.8S" }, { "status": "affected", "version": "3.16.9S" }, { "status": "affected", "version": "3.16.10S" }, { "status": "affected", "version": "3.17.0S" }, { "status": "affected", "version": "3.17.1S" }, { "status": "affected", "version": "3.17.2S" }, { "status": "affected", "version": "3.17.1aS" }, { "status": "affected", "version": "3.17.3S" }, { "status": "affected", "version": "3.17.4S" }, { "status": "affected", "version": "16.1.1" }, { "status": "affected", "version": "16.1.2" }, { "status": "affected", "version": "16.1.3" }, { "status": "affected", "version": "16.2.1" }, { "status": "affected", "version": "16.2.2" }, { "status": "affected", "version": "3.8.0E" }, { "status": "affected", "version": "3.8.1E" }, { "status": "affected", "version": "3.8.2E" }, { "status": "affected", "version": "3.8.3E" }, { "status": "affected", "version": "3.8.4E" }, { "status": "affected", "version": "3.8.5E" }, { "status": "affected", "version": "3.8.5aE" }, { "status": "affected", "version": "3.8.6E" }, { "status": "affected", "version": "3.8.7E" }, { "status": "affected", "version": "3.8.8E" }, { "status": "affected", "version": "3.8.9E" }, { "status": "affected", "version": "3.8.10E" }, { "status": "affected", "version": "16.3.1" }, { "status": "affected", "version": "16.3.2" }, { "status": "affected", "version": "16.3.3" }, { "status": "affected", "version": "16.3.1a" }, { "status": "affected", "version": "16.3.4" }, { "status": "affected", "version": "16.3.5" }, { "status": "affected", "version": "16.3.5b" }, { "status": "affected", "version": "16.3.6" }, { "status": "affected", "version": "16.3.7" }, { "status": "affected", "version": "16.3.8" }, { "status": "affected", "version": "16.3.9" }, { "status": "affected", "version": "16.3.10" }, { "status": "affected", "version": "16.3.11" }, { "status": "affected", "version": "16.4.1" }, { "status": "affected", "version": "16.4.2" }, { "status": "affected", "version": "16.4.3" }, { "status": "affected", "version": "16.5.1" }, { "status": "affected", "version": "16.5.1a" }, { "status": "affected", "version": "16.5.1b" }, { "status": "affected", "version": "16.5.2" }, { "status": "affected", "version": "16.5.3" }, { "status": "affected", "version": "3.18.0aS" }, { "status": "affected", "version": "3.18.0S" }, { "status": "affected", "version": "3.18.1S" }, { "status": "affected", "version": "3.18.2S" }, { "status": "affected", "version": "3.18.3S" }, { "status": "affected", "version": "3.18.4S" }, { "status": "affected", "version": "3.18.0SP" }, { "status": "affected", "version": "3.18.1SP" }, { "status": "affected", "version": "3.18.1aSP" }, { "status": "affected", "version": "3.18.1bSP" }, { "status": "affected", "version": "3.18.1cSP" }, { "status": "affected", "version": "3.18.2SP" }, { "status": "affected", "version": "3.18.2aSP" }, { "status": "affected", "version": "3.18.3SP" }, { "status": "affected", "version": "3.18.4SP" }, { "status": "affected", "version": "3.18.3aSP" }, { "status": "affected", "version": "3.18.3bSP" }, { "status": "affected", "version": "3.18.5SP" }, { "status": "affected", "version": "3.18.6SP" }, { "status": "affected", "version": "3.18.7SP" }, { "status": "affected", "version": "3.18.8aSP" }, { "status": "affected", "version": "3.18.9SP" }, { "status": "affected", "version": "3.9.0E" }, { "status": "affected", "version": "3.9.1E" }, { "status": "affected", "version": "3.9.2E" }, { "status": "affected", "version": "16.6.1" }, { "status": "affected", "version": "16.6.2" }, { "status": "affected", "version": "16.6.3" }, { "status": "affected", "version": "16.6.4" }, { "status": "affected", "version": "16.6.5" }, { "status": "affected", "version": "16.6.4a" }, { "status": "affected", "version": "16.6.5a" }, { "status": "affected", "version": "16.6.6" }, { "status": "affected", "version": "16.6.7" }, { "status": "affected", "version": "16.6.8" }, { "status": "affected", "version": "16.6.9" }, { "status": "affected", "version": "16.6.10" }, { "status": "affected", "version": "16.7.1" }, { "status": "affected", "version": "16.7.1a" }, { "status": "affected", "version": "16.7.1b" }, { "status": "affected", "version": "16.7.2" }, { "status": "affected", "version": "16.7.3" }, { "status": "affected", "version": "16.7.4" }, { "status": "affected", "version": "16.8.1" }, { "status": "affected", "version": "16.8.1a" }, { "status": "affected", "version": "16.8.1b" }, { "status": "affected", "version": "16.8.1s" }, { "status": "affected", "version": "16.8.1c" }, { "status": "affected", "version": "16.8.1d" }, { "status": "affected", "version": "16.8.2" }, { "status": "affected", "version": "16.8.1e" }, { "status": "affected", "version": "16.8.3" }, { "status": "affected", "version": "16.9.1" }, { "status": "affected", "version": "16.9.2" }, { "status": "affected", "version": "16.9.1a" }, { "status": "affected", "version": "16.9.1b" }, { "status": "affected", "version": "16.9.1s" }, { "status": "affected", "version": "16.9.3" }, { "status": "affected", "version": "16.9.4" }, { "status": "affected", "version": "16.9.3a" }, { "status": "affected", "version": "16.9.5" }, { "status": "affected", "version": "16.9.5f" }, { "status": "affected", "version": "16.9.6" }, { "status": "affected", "version": "16.9.7" }, { "status": "affected", "version": "16.9.8" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "16.10.1a" }, { "status": "affected", "version": "16.10.1b" }, { "status": "affected", "version": "16.10.1s" }, { "status": "affected", "version": "16.10.1c" }, { "status": "affected", "version": "16.10.1e" }, { "status": "affected", "version": "16.10.1d" }, { "status": "affected", "version": "16.10.2" }, { "status": "affected", "version": "16.10.1f" }, { "status": "affected", "version": "16.10.1g" }, { "status": "affected", "version": "16.10.3" }, { "status": "affected", "version": "3.10.0E" }, { "status": "affected", "version": "3.10.1E" }, { "status": "affected", "version": "3.10.0cE" }, { "status": "affected", "version": "3.10.2E" }, { "status": "affected", "version": "3.10.3E" }, { "status": "affected", "version": "16.11.1" }, { "status": "affected", "version": "16.11.1a" }, { "status": "affected", "version": "16.11.1b" }, { "status": "affected", "version": "16.11.2" }, { "status": "affected", "version": "16.11.1s" }, { "status": "affected", "version": "16.12.1" }, { "status": "affected", "version": "16.12.1s" }, { "status": "affected", "version": "16.12.1a" }, { "status": "affected", "version": "16.12.1c" }, { "status": "affected", "version": "16.12.1w" }, { "status": "affected", "version": "16.12.2" }, { "status": "affected", "version": "16.12.1y" }, { "status": "affected", "version": "16.12.2a" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "16.12.2s" }, { "status": "affected", "version": "16.12.1x" }, { "status": "affected", "version": "16.12.1t" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.3s" }, { "status": "affected", "version": "16.12.3a" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "16.12.1z1" }, { "status": "affected", "version": "16.12.5a" }, { "status": "affected", "version": "16.12.5b" }, { "status": "affected", "version": "16.12.1z2" }, { "status": "affected", "version": "16.12.6a" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "16.12.9" }, { "status": "affected", "version": "16.12.10" }, { "status": "affected", "version": "16.12.10a" }, { "status": "affected", "version": "16.12.11" }, { "status": "affected", "version": "16.12.12" }, { "status": "affected", "version": "16.12.13" }, { "status": "affected", "version": "3.11.0E" }, { "status": "affected", "version": "3.11.1E" }, { "status": "affected", "version": "3.11.2E" }, { "status": "affected", "version": "3.11.3E" }, { "status": "affected", "version": "3.11.1aE" }, { "status": "affected", "version": "3.11.4E" }, { "status": "affected", "version": "3.11.3aE" }, { "status": "affected", "version": "3.11.5E" }, { "status": "affected", "version": "3.11.6E" }, { "status": "affected", "version": "3.11.7E" }, { "status": "affected", "version": "3.11.8E" }, { "status": "affected", "version": "3.11.9E" }, { "status": "affected", "version": "3.11.10E" }, { "status": "affected", "version": "3.11.11E" }, { "status": "affected", "version": "3.11.12E" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "17.1.1a" }, { "status": "affected", "version": "17.1.1s" }, { "status": "affected", "version": "17.1.1t" }, { "status": "affected", "version": "17.1.3" }, { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1r" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.2.1v" }, { "status": "affected", "version": "17.2.2" }, { "status": "affected", "version": "17.2.3" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "17.3.1w" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.1x" }, { "status": "affected", "version": "17.3.1z" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.4.2a" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.1w" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "17.6.1x" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.1z" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.1z1" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.6.8a" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "17.7.1b" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1a" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.1w" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.9.1x" }, { "status": "affected", "version": "17.9.1y" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.9.1x1" }, { "status": "affected", "version": "17.9.3a" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.1y1" }, { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.9.5a" }, { "status": "affected", "version": "17.9.5b" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.9.7" }, { "status": "affected", "version": "17.9.5e" }, { "status": "affected", "version": "17.9.5f" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.1w" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.12.1x" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.2a" }, { "status": "affected", "version": "17.12.1y" }, { "status": "affected", "version": "17.12.1z" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.1z1" }, { "status": "affected", "version": "17.12.1z2" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.12.5" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.12.1z3" }, { "status": "affected", "version": "17.12.5a" }, { "status": "affected", "version": "17.12.1z4" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.13.1a" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.14.1a" }, { "status": "affected", "version": "17.11.99SW" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.1w" }, { "status": "affected", "version": "17.15.1a" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.1b" }, { "status": "affected", "version": "17.15.1x" }, { "status": "affected", "version": "17.15.3" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.1y" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.16.1" }, { "status": "affected", "version": "17.16.1a" }, { "status": "affected", "version": "17.17.1" } ] }, { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco IOS Software, IOS XE Software, Secure Firewall Adaptive Security Appliance (ASA) Software, and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a lack of proper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. In the case of Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly. In the case of Cisco ASA and FTD Software, a successful exploit could allow the attacker to partially exhaust system memory, causing system instability such as being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:47:59.134Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy" } ], "source": { "advisory": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "defects": [ "CSCwo15023", "CSCwo49948" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20239", "datePublished": "2025-08-14T16:29:17.976Z", "dateReserved": "2024-10-10T19:15:13.237Z", "dateUpdated": "2025-08-14T19:20:06.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20220 (GCVE-0-2025-20220)
Vulnerability from cvelistv5
Published
2025-08-14 16:40
Modified
2025-08-16 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the CLI of Cisco Secure Firewall Management Center (FMC) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root.
This vulnerability is due to improper input validation for specific CLI commands. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials.
For more information about vulnerable scenarios, see the Details ["#details"] section of this advisory.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Firepower Management Center |
Version: 7.2.6 Version: 7.2.7 Version: 7.2.8 Version: 7.2.8.1 Version: 7.2.9 Version: 7.4.1 Version: 7.4.1.1 Version: 7.4.2 Version: 7.4.2.1 Version: 7.6.0 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20220", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-16T03:55:47.997Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Firepower Management Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.6.0" } ] }, { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.6.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco Secure Firewall Management Center (FMC) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root.\r\n\r This vulnerability is due to improper input validation for specific CLI commands. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials.\r\n\r For more information about vulnerable scenarios, see the Details [\"#details\"] section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:40:27.002Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fmc-ftd-cmdinj-PhE7kmT", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-ftd-cmdinj-PhE7kmT" } ], "source": { "advisory": "cisco-sa-fmc-ftd-cmdinj-PhE7kmT", "defects": [ "CSCwm99884" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20220", "datePublished": "2025-08-14T16:40:27.002Z", "dateReserved": "2024-10-10T19:15:13.233Z", "dateUpdated": "2025-08-16T03:55:47.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20134 (GCVE-0-2025-20134)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-415 - Double Free
Summary
A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper parsing of SSL/TLS certificates. An attacker could exploit this vulnerability by sending a crafted SSL/TLS certificate to an affected system through a listening SSL/TLS socket. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.4.39 Version: 9.12.4.40 Version: 9.14.4.6 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.12.4.55 Version: 9.14.4.22 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.12.4.58 Version: 9.12.4.62 Version: 9.12.4.65 Version: 9.12.4.67 Version: 9.14.4.24 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20134", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:42:13.832362Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:21:52.387Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper parsing of\u0026nbsp;SSL/TLS certificates. An attacker could exploit this vulnerability by sending a crafted SSL/TLS certificate to an affected system through a listening SSL/TLS socket. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "Double Free", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:07.782Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-ssltls-dos-eHw76vZe", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe" } ], "source": { "advisory": "cisco-sa-asaftd-ssltls-dos-eHw76vZe", "defects": [ "CSCwk44159" ], "discovery": "INTERNAL" }, "title": "Cisco Adaptive Security Appliance and Firepower Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20134", "datePublished": "2025-08-14T16:28:07.782Z", "dateReserved": "2024-10-10T19:15:13.212Z", "dateUpdated": "2025-08-14T19:21:52.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20301 (GCVE-0-2025-20301)
Vulnerability from cvelistv5
Published
2025-08-14 16:30
Modified
2025-08-14 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, low-privileged, remote attacker to access troubleshoot files for a different domain.
This vulnerability is due to missing authorization checks. An attacker could exploit this vulnerability by directly accessing a troubleshoot file for a different domain that is managed on the same Cisco Secure FMC instance. A successful exploit could allow the attacker to retrieve a troubleshoot file for a different domain, which could allow the attacker to access sensitive information contained in the troubleshoot file.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.6.3 Version: 6.6.4 Version: 6.4.0.12 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.6.5.1 Version: 6.4.0.13 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.1.0.1 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.0.6.2 Version: 6.4.0.18 Version: 6.6.7.2 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.6.0 Version: 7.4.2 Version: 7.2.8.1 Version: 7.0.6.3 Version: 7.4.2.1 Version: 7.2.9 Version: 7.0.7 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20301", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:37:05.586526Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:18:50.657Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Management Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.3.1" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, low-privileged, remote attacker to access troubleshoot files for a different domain.\r\n\r\nThis vulnerability is due to missing authorization checks. An attacker could exploit this vulnerability by directly accessing a troubleshoot file for a different domain that is managed on the same Cisco Secure FMC instance. A successful exploit could allow the attacker to retrieve a troubleshoot file for a different domain, which could allow the attacker to access sensitive information contained in the troubleshoot file." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "Missing Authorization", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:30:45.530Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fmc-authz-bypass-M7xhnAu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-authz-bypass-M7xhnAu" } ], "source": { "advisory": "cisco-sa-fmc-authz-bypass-M7xhnAu", "defects": [ "CSCwn18575" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20301", "datePublished": "2025-08-14T16:30:45.530Z", "dateReserved": "2024-10-10T19:15:13.252Z", "dateUpdated": "2025-08-14T19:18:50.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20263 (GCVE-0-2025-20263)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-14 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-680 - Integer Overflow to Buffer Overflow
Summary
A vulnerability in the web services interface of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected system.
This vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could cause the system to reload, resulting in a denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.8.3 Version: 9.12.1 Version: 9.8.1 Version: 9.12.2 Version: 9.8.2.45 Version: 9.8.2 Version: 9.8.4 Version: 9.14.1 Version: 9.12.4 Version: 9.8.2.26 Version: 9.8.2.24 Version: 9.8.2.15 Version: 9.8.2.14 Version: 9.8.2.35 Version: 9.8.2.20 Version: 9.8.2.8 Version: 9.8.2.17 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.38 Version: 9.8.4.25 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.8.3.18 Version: 9.8.3.14 Version: 9.8.4.15 Version: 9.8.4.8 Version: 9.8.1.7 Version: 9.8.3.29 Version: 9.14.1.10 Version: 9.12.2.5 Version: 9.8.4.22 Version: 9.12.3.12 Version: 9.8.4.7 Version: 9.8.4.17 Version: 9.8.3.16 Version: 9.8.4.20 Version: 9.8.3.11 Version: 9.12.1.3 Version: 9.8.4.3 Version: 9.12.2.4 Version: 9.8.4.12 Version: 9.12.1.2 Version: 9.8.3.26 Version: 9.8.1.5 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.8.3.21 Version: 9.8.4.10 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.14.1.6 Version: 9.8.3.8 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.8.4.26 Version: 9.12.4.4 Version: 9.14.1.30 Version: 9.8.4.29 Version: 9.12.4.7 Version: 9.14.2 Version: 9.12.4.8 Version: 9.8.4.32 Version: 9.12.4.10 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.12.4.13 Version: 9.8.4.33 Version: 9.14.2.13 Version: 9.8.4.34 Version: 9.12.4.18 Version: 9.8.4.35 Version: 9.14.2.15 Version: 9.12.4.24 Version: 9.16.1 Version: 9.8.4.39 Version: 9.14.3 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.14.3.1 Version: 9.12.4.29 Version: 9.14.3.9 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.8.4.40 Version: 9.14.3.11 Version: 9.12.4.35 Version: 9.8.4.41 Version: 9.14.3.13 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.14.3.15 Version: 9.17.1 Version: 9.16.2.11 Version: 9.14.3.18 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.8.4.43 Version: 9.14.4 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.14.4.6 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.8.4.44 Version: 9.18.1 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.17.1.15 Version: 9.8.4.45 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.8.4.46 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.14.4.22 Version: 9.16.4.14 Version: 9.8.4.48 Version: 9.18.3 Version: 9.19.1.5 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.16.4.18 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.14.4.24 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.18.4.34 Version: 9.20.3 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.18.4.40 Version: 9.22.1.1 Version: 9.16.4.71 Version: 9.20.3.4 Version: 9.18.4.47 Version: 9.20.3.7 Version: 9.17.1.45 Version: 9.19.1.37 Version: 9.17.1.46 Version: 9.16.4.76 Version: 9.20.3.9 Version: 9.19.1.38 Version: 9.18.4.50 Version: 9.22.1.3 Version: 9.20.3.10 Version: 9.22.1.2 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20263", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:37:49.526741Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:19:14.999Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.22.1.2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web services interface of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected system.\u0026nbsp;\r\n\r\nThis vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could cause the system to reload, resulting in a denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-680", "description": "Integer Overflow to Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:29:53.787Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asa-buffer-overflow-PyRUhWBC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC" } ], "source": { "advisory": "cisco-sa-asa-buffer-overflow-PyRUhWBC", "defects": [ "CSCwn21584" ], "discovery": "INTERNAL" }, "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Buffer Overflow Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20263", "datePublished": "2025-08-14T16:29:53.787Z", "dateReserved": "2024-10-10T19:15:13.243Z", "dateUpdated": "2025-08-14T19:19:14.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20238 (GCVE-0-2025-20238)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-15 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1244 - Improper Authorization on Physical Debug and Test Interfaces
Summary
A vulnerability in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying operating system as root.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.8.1 Version: 9.8.1.5 Version: 9.8.1.7 Version: 9.8.2 Version: 9.8.2.8 Version: 9.8.2.14 Version: 9.8.2.15 Version: 9.8.2.17 Version: 9.8.2.20 Version: 9.8.2.24 Version: 9.8.2.26 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.35 Version: 9.8.2.38 Version: 9.8.3.8 Version: 9.8.3.11 Version: 9.8.3.14 Version: 9.8.3.16 Version: 9.8.3.18 Version: 9.8.3.21 Version: 9.8.3 Version: 9.8.3.26 Version: 9.8.3.29 Version: 9.8.4 Version: 9.8.4.3 Version: 9.8.4.7 Version: 9.8.4.8 Version: 9.8.4.10 Version: 9.8.4.12 Version: 9.8.4.15 Version: 9.8.4.17 Version: 9.8.2.45 Version: 9.8.4.25 Version: 9.8.4.20 Version: 9.8.4.22 Version: 9.8.4.26 Version: 9.8.4.29 Version: 9.8.4.32 Version: 9.8.4.33 Version: 9.8.4.34 Version: 9.8.4.35 Version: 9.8.4.39 Version: 9.8.4.40 Version: 9.8.4.41 Version: 9.8.4.43 Version: 9.8.4.44 Version: 9.8.4.45 Version: 9.8.4.46 Version: 9.8.4.48 Version: 9.12.1 Version: 9.12.1.2 Version: 9.12.1.3 Version: 9.12.2 Version: 9.12.2.4 Version: 9.12.2.5 Version: 9.12.2.9 Version: 9.12.3 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.12.4 Version: 9.12.3.12 Version: 9.12.3.9 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.12.4.4 Version: 9.12.4.7 Version: 9.12.4.10 Version: 9.12.4.13 Version: 9.12.4.8 Version: 9.12.4.18 Version: 9.12.4.24 Version: 9.12.4.26 Version: 9.12.4.29 Version: 9.12.4.30 Version: 9.12.4.35 Version: 9.12.4.37 Version: 9.12.4.38 Version: 9.12.4.39 Version: 9.12.4.40 Version: 9.12.4.41 Version: 9.12.4.47 Version: 9.12.4.48 Version: 9.12.4.50 Version: 9.12.4.52 Version: 9.12.4.54 Version: 9.12.4.55 Version: 9.12.4.56 Version: 9.12.4.58 Version: 9.12.4.62 Version: 9.12.4.65 Version: 9.12.4.67 Version: 9.14.1 Version: 9.14.1.10 Version: 9.14.1.6 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.14.1.30 Version: 9.14.2 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.14.2.13 Version: 9.14.2.15 Version: 9.14.3 Version: 9.14.3.1 Version: 9.14.3.9 Version: 9.14.3.11 Version: 9.14.3.13 Version: 9.14.3.18 Version: 9.14.3.15 Version: 9.14.4 Version: 9.14.4.6 Version: 9.14.4.7 Version: 9.14.4.12 Version: 9.14.4.13 Version: 9.14.4.14 Version: 9.14.4.15 Version: 9.14.4.17 Version: 9.14.4.22 Version: 9.14.4.23 Version: 9.14.4.24 Version: 9.16.1 Version: 9.16.1.28 Version: 9.16.2 Version: 9.16.2.3 Version: 9.16.2.7 Version: 9.16.2.11 Version: 9.16.2.13 Version: 9.16.2.14 Version: 9.16.3 Version: 9.16.3.3 Version: 9.16.3.14 Version: 9.16.3.15 Version: 9.16.3.19 Version: 9.16.3.23 Version: 9.16.4 Version: 9.16.4.9 Version: 9.16.4.14 Version: 9.16.4.18 Version: 9.16.4.19 Version: 9.16.4.27 Version: 9.16.4.38 Version: 9.16.4.39 Version: 9.16.4.42 Version: 9.16.4.48 Version: 9.16.4.55 Version: 9.16.4.57 Version: 9.16.4.61 Version: 9.16.4.62 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.16.4.71 Version: 9.16.4.76 Version: 9.16.4.82 Version: 9.17.1 Version: 9.17.1.7 Version: 9.17.1.9 Version: 9.17.1.10 Version: 9.17.1.11 Version: 9.17.1.13 Version: 9.17.1.15 Version: 9.17.1.20 Version: 9.17.1.30 Version: 9.17.1.33 Version: 9.17.1.39 Version: 9.17.1.45 Version: 9.17.1.46 Version: 9.18.1 Version: 9.18.1.3 Version: 9.18.2 Version: 9.18.2.5 Version: 9.18.2.7 Version: 9.18.2.8 Version: 9.18.3 Version: 9.18.3.39 Version: 9.18.3.46 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.18.3.56 Version: 9.18.4 Version: 9.18.4.5 Version: 9.18.4.8 Version: 9.18.4.22 Version: 9.18.4.24 Version: 9.18.4.29 Version: 9.18.4.34 Version: 9.18.4.40 Version: 9.18.4.47 Version: 9.18.4.50 Version: 9.18.4.52 Version: 9.18.4.53 Version: 9.19.1 Version: 9.19.1.5 Version: 9.19.1.9 Version: 9.19.1.12 Version: 9.19.1.18 Version: 9.19.1.22 Version: 9.19.1.24 Version: 9.19.1.27 Version: 9.19.1.28 Version: 9.19.1.31 Version: 9.19.1.37 Version: 9.19.1.38 Version: 9.20.1 Version: 9.20.1.5 Version: 9.20.2 Version: 9.20.2.10 Version: 9.20.2.21 Version: 9.20.2.22 Version: 9.20.3 Version: 9.20.3.4 Version: 9.20.3.7 Version: 9.20.3.9 Version: 9.20.3.10 Version: 9.20.3.13 Version: 9.22.1.1 Version: 9.22.1.3 Version: 9.22.1.2 Version: 9.22.1.6 Version: 9.23.1 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20238", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-15T03:55:51.201Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.16.4.82" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.23.1" } ] }, { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r This vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying operating system as root." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1244", "description": "Improper Authorization on Physical Debug and Test Interfaces", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:44:43.359Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-cmdinj-VEhFeZQ3", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmdinj-VEhFeZQ3" } ], "source": { "advisory": "cisco-sa-asaftd-cmdinj-VEhFeZQ3", "defects": [ "CSCwn91612" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20238", "datePublished": "2025-08-14T16:29:07.854Z", "dateReserved": "2024-10-10T19:15:13.237Z", "dateUpdated": "2025-08-15T03:55:51.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20243 (GCVE-0-2025-20243)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-14 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
A vulnerability in the management and VPN web servers of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
This vulnerability is due to improper validation of user-supplied input on an interface with VPN web services. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on an affected device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.8.3 Version: 9.12.1 Version: 9.8.1 Version: 9.12.2 Version: 9.8.2.45 Version: 9.8.2 Version: 9.8.4 Version: 9.14.1 Version: 9.12.4 Version: 9.8.2.26 Version: 9.8.2.24 Version: 9.8.2.15 Version: 9.8.2.14 Version: 9.8.2.35 Version: 9.8.2.20 Version: 9.8.2.8 Version: 9.8.2.17 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.38 Version: 9.8.4.25 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.8.3.18 Version: 9.8.3.14 Version: 9.8.4.15 Version: 9.8.4.8 Version: 9.8.1.7 Version: 9.8.3.29 Version: 9.14.1.10 Version: 9.12.2.5 Version: 9.8.4.22 Version: 9.12.3.12 Version: 9.8.4.7 Version: 9.8.4.17 Version: 9.8.3.16 Version: 9.8.4.20 Version: 9.8.3.11 Version: 9.12.1.3 Version: 9.8.4.3 Version: 9.12.2.4 Version: 9.8.4.12 Version: 9.12.1.2 Version: 9.8.3.26 Version: 9.8.1.5 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.8.3.21 Version: 9.8.4.10 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.14.1.6 Version: 9.8.3.8 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.8.4.26 Version: 9.12.4.4 Version: 9.14.1.30 Version: 9.8.4.29 Version: 9.12.4.7 Version: 9.14.2 Version: 9.12.4.8 Version: 9.8.4.32 Version: 9.12.4.10 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.12.4.13 Version: 9.8.4.33 Version: 9.14.2.13 Version: 9.8.4.34 Version: 9.12.4.18 Version: 9.8.4.35 Version: 9.14.2.15 Version: 9.12.4.24 Version: 9.16.1 Version: 9.8.4.39 Version: 9.14.3 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.14.3.1 Version: 9.12.4.29 Version: 9.14.3.9 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.8.4.40 Version: 9.14.3.11 Version: 9.12.4.35 Version: 9.8.4.41 Version: 9.14.3.13 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.14.3.15 Version: 9.17.1 Version: 9.16.2.11 Version: 9.14.3.18 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.8.4.43 Version: 9.14.4 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.14.4.6 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.8.4.44 Version: 9.18.1 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.17.1.15 Version: 9.8.4.45 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.8.4.46 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.14.4.22 Version: 9.16.4.14 Version: 9.8.4.48 Version: 9.18.3 Version: 9.19.1.5 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.16.4.18 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.14.4.24 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.18.4.34 Version: 9.20.3 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.18.4.40 Version: 9.23.1 Version: 9.22.1.1 Version: 9.16.4.71 Version: 9.20.3.4 Version: 9.18.4.47 Version: 9.20.3.7 Version: 9.17.1.45 Version: 9.19.1.37 Version: 9.17.1.46 Version: 9.16.4.76 Version: 9.20.3.9 Version: 9.19.1.38 Version: 9.18.4.50 Version: 9.22.1.3 Version: 9.20.3.10 Version: 9.22.1.2 Version: 9.18.4.52 Version: 9.20.3.13 Version: 9.22.1.6 Version: 9.18.4.53 Version: 9.16.4.82 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20243", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:39:09.843152Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:19:56.383Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.23.1" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.16.4.82" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.7.0" }, { "status": "affected", "version": "7.4.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the management and VPN web servers of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a DoS condition.\r\n\r\nThis vulnerability is due to improper validation of user-supplied input on an interface with VPN web services. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on an affected device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:29:21.309Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-vpn-dos-mfPekA6e", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e" } ], "source": { "advisory": "cisco-sa-asaftd-vpn-dos-mfPekA6e", "defects": [ "CSCwo15027" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20243", "datePublished": "2025-08-14T16:29:21.309Z", "dateReserved": "2024-10-10T19:15:13.238Z", "dateUpdated": "2025-08-14T19:19:56.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20136 (GCVE-0-2025-20136)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
A vulnerability in the function that performs IPv4 and IPv6 Network Address Translation (NAT) DNS inspection for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to an infinite loop condition that occurs when a Cisco Secure ASA or Cisco Secure FTD device processes DNS packets with DNS inspection enabled and the device is configured for NAT44, NAT64, or NAT46. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static NAT rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to create an infinite loop and cause the device to reload, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.8.3 Version: 9.12.1 Version: 9.8.1 Version: 9.12.2 Version: 9.8.2.45 Version: 9.8.2 Version: 9.8.4 Version: 9.14.1 Version: 9.12.4 Version: 9.8.2.26 Version: 9.8.2.24 Version: 9.8.2.15 Version: 9.8.2.14 Version: 9.8.2.35 Version: 9.8.2.20 Version: 9.8.2.8 Version: 9.8.2.17 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.38 Version: 9.8.4.25 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.8.3.18 Version: 9.8.3.14 Version: 9.8.4.15 Version: 9.8.4.8 Version: 9.8.1.7 Version: 9.8.3.29 Version: 9.14.1.10 Version: 9.12.2.5 Version: 9.8.4.22 Version: 9.12.3.12 Version: 9.8.4.7 Version: 9.8.4.17 Version: 9.8.3.16 Version: 9.8.4.20 Version: 9.8.3.11 Version: 9.12.1.3 Version: 9.8.4.3 Version: 9.12.2.4 Version: 9.8.4.12 Version: 9.12.1.2 Version: 9.8.3.26 Version: 9.8.1.5 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.8.3.21 Version: 9.8.4.10 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.14.1.6 Version: 9.8.3.8 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.8.4.26 Version: 9.12.4.4 Version: 9.14.1.30 Version: 9.8.4.29 Version: 9.12.4.7 Version: 9.14.2 Version: 9.12.4.8 Version: 9.8.4.32 Version: 9.12.4.10 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.12.4.13 Version: 9.8.4.33 Version: 9.14.2.13 Version: 9.8.4.34 Version: 9.12.4.18 Version: 9.8.4.35 Version: 9.14.2.15 Version: 9.12.4.24 Version: 9.16.1 Version: 9.8.4.39 Version: 9.14.3 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.14.3.1 Version: 9.12.4.29 Version: 9.14.3.9 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.8.4.40 Version: 9.14.3.11 Version: 9.12.4.35 Version: 9.8.4.41 Version: 9.15.1.1 Version: 9.14.3.13 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.14.3.15 Version: 9.17.1 Version: 9.16.2.11 Version: 9.14.3.18 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.8.4.43 Version: 9.14.4 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.14.4.6 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.8.4.44 Version: 9.18.1 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.17.1.15 Version: 9.8.4.45 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.8.4.46 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.14.4.22 Version: 9.16.4.14 Version: 9.8.4.48 Version: 9.18.3 Version: 9.19.1.5 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.16.4.18 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.14.4.24 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.18.4.34 Version: 9.20.3 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.18.4.40 Version: 9.22.1.1 Version: 9.16.4.71 Version: 9.20.3.4 Version: 9.18.4.47 Version: 9.17.1.45 Version: 9.19.1.37 Version: 9.17.1.46 Version: 9.19.1.38 Version: 9.22.1.2 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20136", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:41:17.763976Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:21:21.353Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.15.1.1" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.22.1.2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the function that performs IPv4 and IPv6 Network Address Translation (NAT) DNS inspection for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\u0026nbsp;\r\n\r\nThis vulnerability is due to an infinite loop condition that occurs when a Cisco Secure ASA or Cisco Secure FTD device processes DNS packets with DNS inspection enabled and the device is configured for NAT44, NAT64, or NAT46. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static NAT rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to create an infinite loop and cause the device to reload, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:17.964Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-nat-dns-dos-bqhynHTM", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM" } ], "source": { "advisory": "cisco-sa-asaftd-nat-dns-dos-bqhynHTM", "defects": [ "CSCwm08232" ], "discovery": "INTERNAL" }, "title": "Cisco Adaptive Security Appliance and Firepower Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20136", "datePublished": "2025-08-14T16:28:17.964Z", "dateReserved": "2024-10-10T19:15:13.213Z", "dateUpdated": "2025-08-14T19:21:21.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20225 (GCVE-0-2025-20225)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco IOS Software, IOS XE Software, Secure Firewall Adaptive Security Appliance (ASA) Software, and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.
This vulnerability is due to a lack of proper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. In the case of Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly. In the case of Cisco ASA and FTD Software, a successful exploit could allow the attacker to partially exhaust system memory, causing system instability such as being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | IOS |
Version: 15.1(2)T Version: 15.1(1)T4 Version: 15.1(3)T2 Version: 15.1(1)T1 Version: 15.1(2)T0a Version: 15.1(3)T3 Version: 15.1(1)T3 Version: 15.1(2)T3 Version: 15.1(2)T4 Version: 15.1(1)T2 Version: 15.1(3)T Version: 15.1(2)T2a Version: 15.1(3)T1 Version: 15.1(1)T Version: 15.1(2)T2 Version: 15.1(2)T1 Version: 15.1(2)T5 Version: 15.1(3)T4 Version: 15.1(1)T5 Version: 15.3(1)T Version: 15.3(2)T Version: 15.3(1)T1 Version: 15.3(1)T2 Version: 15.3(1)T3 Version: 15.3(1)T4 Version: 15.3(2)T1 Version: 15.3(2)T2 Version: 15.3(2)T3 Version: 15.3(2)T4 Version: 15.0(2)EY Version: 15.0(2)EY1 Version: 15.0(2)EY2 Version: 15.0(2)EY3 Version: 15.1(4)M3 Version: 15.1(4)M Version: 15.1(4)M1 Version: 15.1(4)M2 Version: 15.1(4)M6 Version: 15.1(4)M5 Version: 15.1(4)M4 Version: 15.1(4)M7 Version: 15.1(4)M3a Version: 15.1(4)M10 Version: 15.1(4)M8 Version: 15.1(4)M9 Version: 15.0(2)SE Version: 15.0(2)SE1 Version: 15.0(2)SE2 Version: 15.0(2)SE3 Version: 15.0(2)SE4 Version: 15.0(2)SE5 Version: 15.0(2)SE6 Version: 15.0(2)SE7 Version: 15.0(2)SE8 Version: 15.0(2)SE9 Version: 15.0(2)SE10 Version: 15.0(2)SE11 Version: 15.0(2)SE10a Version: 15.0(2)SE12 Version: 15.0(2)SE13 Version: 15.1(2)GC Version: 15.1(2)GC1 Version: 15.1(2)GC2 Version: 15.1(4)GC Version: 15.1(4)GC1 Version: 15.1(4)GC2 Version: 15.1(1)SG Version: 15.1(2)SG Version: 15.1(1)SG1 Version: 15.1(1)SG2 Version: 15.1(2)SG1 Version: 15.1(2)SG2 Version: 15.1(2)SG3 Version: 15.1(2)SG4 Version: 15.1(2)SG5 Version: 15.1(2)SG6 Version: 15.1(2)SG7 Version: 15.1(2)SG8 Version: 15.2(4)M Version: 15.2(4)M1 Version: 15.2(4)M2 Version: 15.2(4)M4 Version: 15.2(4)M3 Version: 15.2(4)M5 Version: 15.2(4)M8 Version: 15.2(4)M10 Version: 15.2(4)M7 Version: 15.2(4)M6 Version: 15.2(4)M9 Version: 15.2(4)M6a Version: 15.2(4)M11 Version: 15.0(2)EX Version: 15.0(2)EX1 Version: 15.0(2)EX2 Version: 15.0(2)EX3 Version: 15.0(2)EX4 Version: 15.0(2)EX5 Version: 15.0(2)EX8 Version: 15.0(2a)EX5 Version: 15.0(2)EX10 Version: 15.0(2)EX11 Version: 15.0(2)EX13 Version: 15.0(2)EX12 Version: 15.2(1)GC Version: 15.2(1)GC1 Version: 15.2(1)GC2 Version: 15.2(2)GC Version: 15.2(3)GC Version: 15.2(3)GC1 Version: 15.2(4)GC Version: 15.2(4)GC1 Version: 15.2(4)GC2 Version: 15.2(4)GC3 Version: 15.1(1)SY Version: 15.1(1)SY1 Version: 15.1(2)SY Version: 15.1(2)SY1 Version: 15.1(2)SY2 Version: 15.1(1)SY2 Version: 15.1(1)SY3 Version: 15.1(2)SY3 Version: 15.1(1)SY4 Version: 15.1(2)SY4 Version: 15.1(1)SY5 Version: 15.1(2)SY5 Version: 15.1(2)SY4a Version: 15.1(1)SY6 Version: 15.1(2)SY6 Version: 15.1(2)SY7 Version: 15.1(2)SY8 Version: 15.1(2)SY9 Version: 15.1(2)SY10 Version: 15.1(2)SY11 Version: 15.1(2)SY12 Version: 15.1(2)SY13 Version: 15.1(2)SY14 Version: 15.1(2)SY15 Version: 15.1(2)SY16 Version: 15.4(1)T Version: 15.4(2)T Version: 15.4(1)T2 Version: 15.4(1)T1 Version: 15.4(1)T3 Version: 15.4(2)T1 Version: 15.4(2)T3 Version: 15.4(2)T2 Version: 15.4(1)T4 Version: 15.4(2)T4 Version: 15.2(1)E Version: 15.2(2)E Version: 15.2(1)E1 Version: 15.2(3)E Version: 15.2(1)E2 Version: 15.2(1)E3 Version: 15.2(2)E1 Version: 15.2(4)E Version: 15.2(3)E1 Version: 15.2(2)E2 Version: 15.2(2a)E1 Version: 15.2(2)E3 Version: 15.2(2a)E2 Version: 15.2(3)E2 Version: 15.2(3a)E Version: 15.2(3)E3 Version: 15.2(4)E1 Version: 15.2(2)E4 Version: 15.2(2)E5 Version: 15.2(4)E2 Version: 15.2(3)E4 Version: 15.2(5)E Version: 15.2(4)E3 Version: 15.2(2)E6 Version: 15.2(5)E1 Version: 15.2(5b)E Version: 15.2(2)E5a Version: 15.2(2)E5b Version: 15.2(5a)E1 Version: 15.2(4)E4 Version: 15.2(2)E7 Version: 15.2(5)E2 Version: 15.2(6)E Version: 15.2(4)E5 Version: 15.2(5)E2c Version: 15.2(2)E8 Version: 15.2(6)E0a Version: 15.2(6)E1 Version: 15.2(6)E0c Version: 15.2(4)E6 Version: 15.2(6)E2 Version: 15.2(2)E9 Version: 15.2(4)E7 Version: 15.2(7)E Version: 15.2(2)E10 Version: 15.2(4)E8 Version: 15.2(6)E2a Version: 15.2(7)E1 Version: 15.2(7)E0a Version: 15.2(7)E0b Version: 15.2(7)E0s Version: 15.2(6)E3 Version: 15.2(4)E9 Version: 15.2(7)E2 Version: 15.2(7a)E0b Version: 15.2(4)E10 Version: 15.2(7)E3 Version: 15.2(7)E1a Version: 15.2(7b)E0b Version: 15.2(4)E10a Version: 15.2(7)E4 Version: 15.2(8)E Version: 15.2(8)E1 Version: 15.2(7)E5 Version: 15.2(7)E6 Version: 15.2(8)E2 Version: 15.2(4)E10d Version: 15.2(7)E7 Version: 15.2(8)E3 Version: 15.2(7)E8 Version: 15.2(8)E4 Version: 15.2(7)E9 Version: 15.2(8)E5 Version: 15.2(8)E6 Version: 15.2(7)E10 Version: 15.2(7)E11 Version: 15.2(8)E7 Version: 15.2(7)E12 Version: 15.1(3)MRA3 Version: 15.1(3)MRA4 Version: 15.1(3)SVB1 Version: 15.1(3)SVB2 Version: 15.4(2)S3 Version: 15.3(3)M Version: 15.3(3)M1 Version: 15.3(3)M2 Version: 15.3(3)M3 Version: 15.3(3)M5 Version: 15.3(3)M4 Version: 15.3(3)M6 Version: 15.3(3)M7 Version: 15.3(3)M8 Version: 15.3(3)M9 Version: 15.3(3)M10 Version: 15.3(3)M8a Version: 15.2(4)JN Version: 15.0(2)EZ Version: 15.1(3)SVD Version: 15.1(3)SVD1 Version: 15.1(3)SVD2 Version: 15.2(1)EY Version: 15.0(2)EJ Version: 15.0(2)EJ1 Version: 15.2(1)SY Version: 15.2(1)SY1 Version: 15.2(1)SY0a Version: 15.2(1)SY2 Version: 15.2(2)SY Version: 15.2(1)SY1a Version: 15.2(2)SY1 Version: 15.2(2)SY2 Version: 15.2(1)SY3 Version: 15.2(1)SY4 Version: 15.2(2)SY3 Version: 15.2(1)SY5 Version: 15.2(1)SY6 Version: 15.2(1)SY7 Version: 15.2(1)SY8 Version: 15.1(3)SVF Version: 15.1(3)SVF1 Version: 15.1(3)SVE Version: 15.0(2)EK Version: 15.0(2)EK1 Version: 15.4(1)CG Version: 15.4(1)CG1 Version: 15.4(2)CG Version: 15.1(3)SVG Version: 15.2(2)EB Version: 15.2(2)EB1 Version: 15.2(2)EB2 Version: 15.2(6)EB Version: 15.5(1)T Version: 15.5(1)T1 Version: 15.5(2)T Version: 15.5(1)T2 Version: 15.5(1)T3 Version: 15.5(2)T1 Version: 15.5(2)T2 Version: 15.5(2)T3 Version: 15.5(2)T4 Version: 15.5(1)T4 Version: 15.2(2)EA Version: 15.2(2)EA2 Version: 15.2(3)EA Version: 15.2(4)EA Version: 15.2(4)EA1 Version: 15.2(2)EA3 Version: 15.2(5)EA Version: 15.2(4)EA4 Version: 15.2(4)EA5 Version: 15.2(4)EA6 Version: 15.2(4)EA7 Version: 15.2(4)EA8 Version: 15.2(4)EA9 Version: 15.2(4)EA9a Version: 15.5(3)M Version: 15.5(3)M1 Version: 15.5(3)M0a Version: 15.5(3)M2 Version: 15.5(3)M3 Version: 15.5(3)M4 Version: 15.5(3)M4a Version: 15.5(3)M5 Version: 15.5(3)M6 Version: 15.5(3)M7 Version: 15.5(3)M6a Version: 15.5(3)M8 Version: 15.5(3)M9 Version: 15.5(3)M10 Version: 15.6(1)T Version: 15.6(2)T Version: 15.6(1)T0a Version: 15.6(1)T1 Version: 15.6(2)T1 Version: 15.6(1)T2 Version: 15.6(2)T2 Version: 15.6(1)T3 Version: 15.6(2)T3 Version: 15.3(1)SY Version: 15.3(1)SY1 Version: 15.3(1)SY2 Version: 15.6(3)M Version: 15.6(3)M1 Version: 15.6(3)M0a Version: 15.6(3)M1b Version: 15.6(3)M2 Version: 15.6(3)M2a Version: 15.6(3)M3 Version: 15.6(3)M3a Version: 15.6(3)M4 Version: 15.6(3)M5 Version: 15.6(3)M6 Version: 15.6(3)M7 Version: 15.6(3)M6a Version: 15.6(3)M6b Version: 15.6(3)M8 Version: 15.6(3)M9 Version: 15.1(3)SVJ2 Version: 15.2(4)EC1 Version: 15.2(4)EC2 Version: 15.3(3)JPC5 Version: 15.4(1)SY Version: 15.4(1)SY1 Version: 15.4(1)SY2 Version: 15.4(1)SY3 Version: 15.4(1)SY4 Version: 15.5(1)SY Version: 15.5(1)SY1 Version: 15.5(1)SY2 Version: 15.5(1)SY3 Version: 15.5(1)SY4 Version: 15.5(1)SY5 Version: 15.5(1)SY6 Version: 15.5(1)SY7 Version: 15.5(1)SY8 Version: 15.5(1)SY9 Version: 15.5(1)SY10 Version: 15.5(1)SY11 Version: 15.5(1)SY12 Version: 15.5(1)SY13 Version: 15.5(1)SY14 Version: 15.5(1)SY15 Version: 15.7(3)M Version: 15.7(3)M1 Version: 15.7(3)M0a Version: 15.7(3)M3 Version: 15.7(3)M2 Version: 15.7(3)M4 Version: 15.7(3)M5 Version: 15.7(3)M4a Version: 15.7(3)M4b Version: 15.7(3)M6 Version: 15.7(3)M7 Version: 15.7(3)M8 Version: 15.7(3)M9 Version: 15.8(3)M Version: 15.8(3)M1 Version: 15.8(3)M0a Version: 15.8(3)M0b Version: 15.8(3)M2 Version: 15.8(3)M1a Version: 15.8(3)M3 Version: 15.8(3)M2a Version: 15.8(3)M4 Version: 15.8(3)M3a Version: 15.8(3)M3b Version: 15.8(3)M5 Version: 15.8(3)M6 Version: 15.8(3)M7 Version: 15.8(3)M8 Version: 15.8(3)M9 Version: 15.9(3)M Version: 15.9(3)M1 Version: 15.9(3)M0a Version: 15.9(3)M2 Version: 15.9(3)M3 Version: 15.9(3)M2a Version: 15.9(3)M3a Version: 15.9(3)M4 Version: 15.9(3)M3b Version: 15.9(3)M5 Version: 15.9(3)M4a Version: 15.9(3)M6 Version: 15.9(3)M7 Version: 15.9(3)M6a Version: 15.9(3)M6b Version: 15.9(3)M8 Version: 15.9(3)M7a Version: 15.9(3)M9 Version: 15.9(3)M8b Version: 15.9(3)M10 Version: 15.9(3)M11 |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20225", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:39:38.990745Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:20:27.927Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "15.1(2)T" }, { "status": "affected", "version": "15.1(1)T4" }, { "status": "affected", "version": "15.1(3)T2" }, { "status": "affected", "version": "15.1(1)T1" }, { "status": "affected", "version": "15.1(2)T0a" }, { "status": "affected", "version": "15.1(3)T3" }, { "status": "affected", "version": "15.1(1)T3" }, { "status": "affected", "version": "15.1(2)T3" }, { "status": "affected", "version": "15.1(2)T4" }, { "status": "affected", "version": "15.1(1)T2" }, { "status": "affected", "version": "15.1(3)T" }, { "status": "affected", "version": "15.1(2)T2a" }, { "status": "affected", "version": "15.1(3)T1" }, { "status": "affected", "version": "15.1(1)T" }, { "status": "affected", "version": "15.1(2)T2" }, { "status": "affected", "version": "15.1(2)T1" }, { "status": "affected", "version": "15.1(2)T5" }, { "status": "affected", "version": "15.1(3)T4" }, { "status": "affected", "version": "15.1(1)T5" }, { "status": "affected", "version": "15.3(1)T" }, { "status": "affected", "version": "15.3(2)T" }, { "status": "affected", "version": "15.3(1)T1" }, { "status": "affected", "version": "15.3(1)T2" }, { "status": "affected", "version": "15.3(1)T3" }, { "status": "affected", "version": "15.3(1)T4" }, { "status": "affected", "version": "15.3(2)T1" }, { "status": "affected", "version": "15.3(2)T2" }, { "status": "affected", "version": "15.3(2)T3" }, { "status": "affected", "version": "15.3(2)T4" }, { "status": "affected", "version": "15.0(2)EY" }, { "status": "affected", "version": "15.0(2)EY1" }, { "status": "affected", "version": "15.0(2)EY2" }, { "status": "affected", "version": "15.0(2)EY3" }, { "status": "affected", "version": "15.1(4)M3" }, { "status": "affected", "version": "15.1(4)M" }, { "status": "affected", "version": "15.1(4)M1" }, { "status": "affected", "version": "15.1(4)M2" }, { "status": "affected", "version": "15.1(4)M6" }, { "status": "affected", "version": "15.1(4)M5" }, { "status": "affected", "version": "15.1(4)M4" }, { "status": "affected", "version": "15.1(4)M7" }, { "status": "affected", "version": "15.1(4)M3a" }, { "status": "affected", "version": "15.1(4)M10" }, { "status": "affected", "version": "15.1(4)M8" }, { "status": "affected", "version": "15.1(4)M9" }, { "status": "affected", "version": "15.0(2)SE" }, { "status": "affected", "version": "15.0(2)SE1" }, { "status": "affected", "version": "15.0(2)SE2" }, { "status": "affected", "version": "15.0(2)SE3" }, { "status": "affected", "version": "15.0(2)SE4" }, { "status": "affected", "version": "15.0(2)SE5" }, { "status": "affected", "version": "15.0(2)SE6" }, { "status": "affected", "version": "15.0(2)SE7" }, { "status": "affected", "version": "15.0(2)SE8" }, { "status": "affected", "version": "15.0(2)SE9" }, { "status": "affected", "version": "15.0(2)SE10" }, { "status": "affected", "version": "15.0(2)SE11" }, { "status": "affected", "version": "15.0(2)SE10a" }, { "status": "affected", "version": "15.0(2)SE12" }, { "status": "affected", "version": "15.0(2)SE13" }, { "status": "affected", "version": "15.1(2)GC" }, { "status": "affected", "version": "15.1(2)GC1" }, { "status": "affected", "version": "15.1(2)GC2" }, { "status": "affected", "version": "15.1(4)GC" }, { "status": "affected", "version": "15.1(4)GC1" }, { "status": "affected", "version": "15.1(4)GC2" }, { "status": "affected", "version": "15.1(1)SG" }, { "status": "affected", "version": "15.1(2)SG" }, { "status": "affected", "version": "15.1(1)SG1" }, { "status": "affected", "version": "15.1(1)SG2" }, { "status": "affected", "version": "15.1(2)SG1" }, { "status": "affected", "version": "15.1(2)SG2" }, { "status": "affected", "version": "15.1(2)SG3" }, { "status": "affected", "version": "15.1(2)SG4" }, { "status": "affected", "version": "15.1(2)SG5" }, { "status": "affected", "version": "15.1(2)SG6" }, { "status": "affected", "version": "15.1(2)SG7" }, { "status": "affected", "version": "15.1(2)SG8" }, { "status": "affected", "version": "15.2(4)M" }, { "status": "affected", "version": "15.2(4)M1" }, { "status": "affected", "version": "15.2(4)M2" }, { "status": "affected", "version": "15.2(4)M4" }, { "status": "affected", "version": "15.2(4)M3" }, { "status": "affected", "version": "15.2(4)M5" }, { "status": "affected", "version": "15.2(4)M8" }, { "status": "affected", "version": "15.2(4)M10" }, { "status": "affected", "version": "15.2(4)M7" }, { "status": "affected", "version": "15.2(4)M6" }, { "status": "affected", "version": "15.2(4)M9" }, { "status": "affected", "version": "15.2(4)M6a" }, { "status": "affected", "version": "15.2(4)M11" }, { "status": "affected", "version": "15.0(2)EX" }, { "status": "affected", "version": "15.0(2)EX1" }, { "status": "affected", "version": "15.0(2)EX2" }, { "status": "affected", "version": "15.0(2)EX3" }, { "status": "affected", "version": "15.0(2)EX4" }, { "status": "affected", "version": "15.0(2)EX5" }, { "status": "affected", "version": "15.0(2)EX8" }, { "status": "affected", "version": "15.0(2a)EX5" }, { "status": "affected", "version": "15.0(2)EX10" }, { "status": "affected", "version": "15.0(2)EX11" }, { "status": "affected", "version": "15.0(2)EX13" }, { "status": "affected", "version": "15.0(2)EX12" }, { "status": "affected", "version": "15.2(1)GC" }, { "status": "affected", "version": "15.2(1)GC1" }, { "status": "affected", "version": "15.2(1)GC2" }, { "status": "affected", "version": "15.2(2)GC" }, { "status": "affected", "version": "15.2(3)GC" }, { "status": "affected", "version": "15.2(3)GC1" }, { "status": "affected", "version": "15.2(4)GC" }, { "status": "affected", "version": "15.2(4)GC1" }, { "status": "affected", "version": "15.2(4)GC2" }, { "status": "affected", "version": "15.2(4)GC3" }, { "status": "affected", "version": "15.1(1)SY" }, { "status": "affected", "version": "15.1(1)SY1" }, { "status": "affected", "version": "15.1(2)SY" }, { "status": "affected", "version": "15.1(2)SY1" }, { "status": "affected", "version": "15.1(2)SY2" }, { "status": "affected", "version": "15.1(1)SY2" }, { "status": "affected", "version": "15.1(1)SY3" }, { "status": "affected", "version": "15.1(2)SY3" }, { "status": "affected", "version": "15.1(1)SY4" }, { "status": "affected", "version": "15.1(2)SY4" }, { "status": "affected", "version": "15.1(1)SY5" }, { "status": "affected", "version": "15.1(2)SY5" }, { "status": "affected", "version": "15.1(2)SY4a" }, { "status": "affected", "version": "15.1(1)SY6" }, { "status": "affected", "version": "15.1(2)SY6" }, { "status": "affected", "version": "15.1(2)SY7" }, { "status": "affected", "version": "15.1(2)SY8" }, { "status": "affected", "version": "15.1(2)SY9" }, { "status": "affected", "version": "15.1(2)SY10" }, { "status": "affected", "version": "15.1(2)SY11" }, { "status": "affected", "version": "15.1(2)SY12" }, { "status": "affected", "version": "15.1(2)SY13" }, { "status": "affected", "version": "15.1(2)SY14" }, { "status": "affected", "version": "15.1(2)SY15" }, { "status": "affected", "version": "15.1(2)SY16" }, { "status": "affected", "version": "15.4(1)T" }, { "status": "affected", "version": "15.4(2)T" }, { "status": "affected", "version": "15.4(1)T2" }, { "status": "affected", "version": "15.4(1)T1" }, { "status": "affected", "version": "15.4(1)T3" }, { "status": "affected", "version": "15.4(2)T1" }, { "status": "affected", "version": "15.4(2)T3" }, { "status": "affected", "version": "15.4(2)T2" }, { "status": "affected", "version": "15.4(1)T4" }, { "status": "affected", "version": "15.4(2)T4" }, { "status": "affected", "version": "15.2(1)E" }, { "status": "affected", "version": "15.2(2)E" }, { "status": "affected", "version": "15.2(1)E1" }, { "status": "affected", "version": "15.2(3)E" }, { "status": "affected", "version": "15.2(1)E2" }, { "status": "affected", "version": "15.2(1)E3" }, { "status": "affected", "version": "15.2(2)E1" }, { "status": "affected", "version": "15.2(4)E" }, { "status": "affected", "version": "15.2(3)E1" }, { "status": "affected", "version": "15.2(2)E2" }, { "status": "affected", "version": "15.2(2a)E1" }, { "status": "affected", "version": "15.2(2)E3" }, { "status": "affected", "version": "15.2(2a)E2" }, { "status": "affected", "version": "15.2(3)E2" }, { "status": "affected", "version": "15.2(3a)E" }, { "status": "affected", "version": "15.2(3)E3" }, { "status": "affected", "version": "15.2(4)E1" }, { "status": "affected", "version": "15.2(2)E4" }, { "status": "affected", "version": "15.2(2)E5" }, { "status": "affected", "version": "15.2(4)E2" }, { "status": "affected", "version": "15.2(3)E4" }, { "status": "affected", "version": "15.2(5)E" }, { "status": "affected", "version": "15.2(4)E3" }, { "status": "affected", "version": "15.2(2)E6" }, { "status": "affected", "version": "15.2(5)E1" }, { "status": "affected", "version": "15.2(5b)E" }, { "status": "affected", "version": "15.2(2)E5a" }, { "status": "affected", "version": "15.2(2)E5b" }, { "status": "affected", "version": "15.2(5a)E1" }, { "status": "affected", "version": "15.2(4)E4" }, { "status": "affected", "version": "15.2(2)E7" }, { "status": "affected", "version": "15.2(5)E2" }, { "status": "affected", "version": "15.2(6)E" }, { "status": "affected", "version": "15.2(4)E5" }, { "status": "affected", "version": "15.2(5)E2c" }, { "status": "affected", "version": "15.2(2)E8" }, { "status": "affected", "version": "15.2(6)E0a" }, { "status": "affected", "version": "15.2(6)E1" }, { "status": "affected", "version": "15.2(6)E0c" }, { "status": "affected", "version": "15.2(4)E6" }, { "status": "affected", "version": "15.2(6)E2" }, { "status": "affected", "version": "15.2(2)E9" }, { "status": "affected", "version": "15.2(4)E7" }, { "status": "affected", "version": "15.2(7)E" }, { "status": "affected", "version": "15.2(2)E10" }, { "status": "affected", "version": "15.2(4)E8" }, { "status": "affected", "version": "15.2(6)E2a" }, { "status": "affected", "version": "15.2(7)E1" }, { "status": "affected", "version": "15.2(7)E0a" }, { "status": "affected", "version": "15.2(7)E0b" }, { "status": "affected", "version": "15.2(7)E0s" }, { "status": "affected", "version": "15.2(6)E3" }, { "status": "affected", "version": "15.2(4)E9" }, { "status": "affected", "version": "15.2(7)E2" }, { "status": "affected", "version": "15.2(7a)E0b" }, { "status": "affected", "version": "15.2(4)E10" }, { "status": "affected", "version": "15.2(7)E3" }, { "status": "affected", "version": "15.2(7)E1a" }, { "status": "affected", "version": "15.2(7b)E0b" }, { "status": "affected", "version": "15.2(4)E10a" }, { "status": "affected", "version": "15.2(7)E4" }, { "status": "affected", "version": "15.2(8)E" }, { "status": "affected", "version": "15.2(8)E1" }, { "status": "affected", "version": "15.2(7)E5" }, { "status": "affected", "version": "15.2(7)E6" }, { "status": "affected", "version": "15.2(8)E2" }, { "status": "affected", "version": "15.2(4)E10d" }, { "status": "affected", "version": "15.2(7)E7" }, { "status": "affected", "version": "15.2(8)E3" }, { "status": "affected", "version": "15.2(7)E8" }, { "status": "affected", "version": "15.2(8)E4" }, { "status": "affected", "version": "15.2(7)E9" }, { "status": "affected", "version": "15.2(8)E5" }, { "status": "affected", "version": "15.2(8)E6" }, { "status": "affected", "version": "15.2(7)E10" }, { "status": "affected", "version": "15.2(7)E11" }, { "status": "affected", "version": "15.2(8)E7" }, { "status": "affected", "version": "15.2(7)E12" }, { "status": "affected", "version": "15.1(3)MRA3" }, { "status": "affected", "version": "15.1(3)MRA4" }, { "status": "affected", "version": "15.1(3)SVB1" }, { "status": "affected", "version": "15.1(3)SVB2" }, { "status": "affected", "version": "15.4(2)S3" }, { "status": "affected", "version": "15.3(3)M" }, { "status": "affected", "version": "15.3(3)M1" }, { "status": "affected", "version": "15.3(3)M2" }, { "status": "affected", "version": "15.3(3)M3" }, { "status": "affected", "version": "15.3(3)M5" }, { "status": "affected", "version": "15.3(3)M4" }, { "status": "affected", "version": "15.3(3)M6" }, { "status": "affected", "version": "15.3(3)M7" }, { "status": "affected", "version": "15.3(3)M8" }, { "status": "affected", "version": "15.3(3)M9" }, { "status": "affected", "version": "15.3(3)M10" }, { "status": "affected", "version": "15.3(3)M8a" }, { "status": "affected", "version": "15.2(4)JN" }, { "status": "affected", "version": "15.0(2)EZ" }, { "status": "affected", "version": "15.1(3)SVD" }, { "status": "affected", "version": "15.1(3)SVD1" }, { "status": "affected", "version": "15.1(3)SVD2" }, { "status": "affected", "version": "15.2(1)EY" }, { "status": "affected", "version": "15.0(2)EJ" }, { "status": "affected", "version": "15.0(2)EJ1" }, { "status": "affected", "version": "15.2(1)SY" }, { "status": "affected", "version": "15.2(1)SY1" }, { "status": "affected", "version": "15.2(1)SY0a" }, { "status": "affected", "version": "15.2(1)SY2" }, { "status": "affected", "version": "15.2(2)SY" }, { "status": "affected", "version": "15.2(1)SY1a" }, { "status": "affected", "version": "15.2(2)SY1" }, { "status": "affected", "version": "15.2(2)SY2" }, { "status": "affected", "version": "15.2(1)SY3" }, { "status": "affected", "version": "15.2(1)SY4" }, { "status": "affected", "version": "15.2(2)SY3" }, { "status": "affected", "version": "15.2(1)SY5" }, { "status": "affected", "version": "15.2(1)SY6" }, { "status": "affected", "version": "15.2(1)SY7" }, { "status": "affected", "version": "15.2(1)SY8" }, { "status": "affected", "version": "15.1(3)SVF" }, { "status": "affected", "version": "15.1(3)SVF1" }, { "status": "affected", "version": "15.1(3)SVE" }, { "status": "affected", "version": "15.0(2)EK" }, { "status": "affected", "version": "15.0(2)EK1" }, { "status": "affected", "version": "15.4(1)CG" }, { "status": "affected", "version": "15.4(1)CG1" }, { "status": "affected", "version": "15.4(2)CG" }, { "status": "affected", "version": "15.1(3)SVG" }, { "status": "affected", "version": "15.2(2)EB" }, { "status": "affected", "version": "15.2(2)EB1" }, { "status": "affected", "version": "15.2(2)EB2" }, { "status": "affected", "version": "15.2(6)EB" }, { "status": "affected", "version": "15.5(1)T" }, { "status": "affected", "version": "15.5(1)T1" }, { "status": "affected", "version": "15.5(2)T" }, { "status": "affected", "version": "15.5(1)T2" }, { "status": "affected", "version": "15.5(1)T3" }, { "status": "affected", "version": "15.5(2)T1" }, { "status": "affected", "version": "15.5(2)T2" }, { "status": "affected", "version": "15.5(2)T3" }, { "status": "affected", "version": "15.5(2)T4" }, { "status": "affected", "version": "15.5(1)T4" }, { "status": "affected", "version": "15.2(2)EA" }, { "status": "affected", "version": "15.2(2)EA2" }, { "status": "affected", "version": "15.2(3)EA" }, { "status": "affected", "version": "15.2(4)EA" }, { "status": "affected", "version": "15.2(4)EA1" }, { "status": "affected", "version": "15.2(2)EA3" }, { "status": "affected", "version": "15.2(5)EA" }, { "status": "affected", "version": "15.2(4)EA4" }, { "status": "affected", "version": "15.2(4)EA5" }, { "status": "affected", "version": "15.2(4)EA6" }, { "status": "affected", "version": "15.2(4)EA7" }, { "status": "affected", "version": "15.2(4)EA8" }, { "status": "affected", "version": "15.2(4)EA9" }, { "status": "affected", "version": "15.2(4)EA9a" }, { "status": "affected", "version": "15.5(3)M" }, { "status": "affected", "version": "15.5(3)M1" }, { "status": "affected", "version": "15.5(3)M0a" }, { "status": "affected", "version": "15.5(3)M2" }, { "status": "affected", "version": "15.5(3)M3" }, { "status": "affected", "version": "15.5(3)M4" }, { "status": "affected", "version": "15.5(3)M4a" }, { "status": "affected", "version": "15.5(3)M5" }, { "status": "affected", "version": "15.5(3)M6" }, { "status": "affected", "version": "15.5(3)M7" }, { "status": "affected", "version": "15.5(3)M6a" }, { "status": "affected", "version": "15.5(3)M8" }, { "status": "affected", "version": "15.5(3)M9" }, { "status": "affected", "version": "15.5(3)M10" }, { "status": "affected", "version": "15.6(1)T" }, { "status": "affected", "version": "15.6(2)T" }, { "status": "affected", "version": "15.6(1)T0a" }, { "status": "affected", "version": "15.6(1)T1" }, { "status": "affected", "version": "15.6(2)T1" }, { "status": "affected", "version": "15.6(1)T2" }, { "status": "affected", "version": "15.6(2)T2" }, { "status": "affected", "version": "15.6(1)T3" }, { "status": "affected", "version": "15.6(2)T3" }, { "status": "affected", "version": "15.3(1)SY" }, { "status": "affected", "version": "15.3(1)SY1" }, { "status": "affected", "version": "15.3(1)SY2" }, { "status": "affected", "version": "15.6(3)M" }, { "status": "affected", "version": "15.6(3)M1" }, { "status": "affected", "version": "15.6(3)M0a" }, { "status": "affected", "version": "15.6(3)M1b" }, { "status": "affected", "version": "15.6(3)M2" }, { "status": "affected", "version": "15.6(3)M2a" }, { "status": "affected", "version": "15.6(3)M3" }, { "status": "affected", "version": "15.6(3)M3a" }, { "status": "affected", "version": "15.6(3)M4" }, { "status": "affected", "version": "15.6(3)M5" }, { "status": "affected", "version": "15.6(3)M6" }, { "status": "affected", "version": "15.6(3)M7" }, { "status": "affected", "version": "15.6(3)M6a" }, { "status": "affected", "version": "15.6(3)M6b" }, { "status": "affected", "version": "15.6(3)M8" }, { "status": "affected", "version": "15.6(3)M9" }, { "status": "affected", "version": "15.1(3)SVJ2" }, { "status": "affected", "version": "15.2(4)EC1" }, { "status": "affected", "version": "15.2(4)EC2" }, { "status": "affected", "version": "15.3(3)JPC5" }, { "status": "affected", "version": "15.4(1)SY" }, { "status": "affected", "version": "15.4(1)SY1" }, { "status": "affected", "version": "15.4(1)SY2" }, { "status": "affected", "version": "15.4(1)SY3" }, { "status": "affected", "version": "15.4(1)SY4" }, { "status": "affected", "version": "15.5(1)SY" }, { "status": "affected", "version": "15.5(1)SY1" }, { "status": "affected", "version": "15.5(1)SY2" }, { "status": "affected", "version": "15.5(1)SY3" }, { "status": "affected", "version": "15.5(1)SY4" }, { "status": "affected", "version": "15.5(1)SY5" }, { "status": "affected", "version": "15.5(1)SY6" }, { "status": "affected", "version": "15.5(1)SY7" }, { "status": "affected", "version": "15.5(1)SY8" }, { "status": "affected", "version": "15.5(1)SY9" }, { "status": "affected", "version": "15.5(1)SY10" }, { "status": "affected", "version": "15.5(1)SY11" }, { "status": "affected", "version": "15.5(1)SY12" }, { "status": "affected", "version": "15.5(1)SY13" }, { "status": "affected", "version": "15.5(1)SY14" }, { "status": "affected", "version": "15.5(1)SY15" }, { "status": "affected", "version": "15.7(3)M" }, { "status": "affected", "version": "15.7(3)M1" }, { "status": "affected", "version": "15.7(3)M0a" }, { "status": "affected", "version": "15.7(3)M3" }, { "status": "affected", "version": "15.7(3)M2" }, { "status": "affected", "version": "15.7(3)M4" }, { "status": "affected", "version": "15.7(3)M5" }, { "status": "affected", "version": "15.7(3)M4a" }, { "status": "affected", "version": "15.7(3)M4b" }, { "status": "affected", "version": "15.7(3)M6" }, { "status": "affected", "version": "15.7(3)M7" }, { "status": "affected", "version": "15.7(3)M8" }, { "status": "affected", "version": "15.7(3)M9" }, { "status": "affected", "version": "15.8(3)M" }, { "status": "affected", "version": "15.8(3)M1" }, { "status": "affected", "version": "15.8(3)M0a" }, { "status": "affected", "version": "15.8(3)M0b" }, { "status": "affected", "version": "15.8(3)M2" }, { "status": "affected", "version": "15.8(3)M1a" }, { "status": "affected", "version": "15.8(3)M3" }, { "status": "affected", "version": "15.8(3)M2a" }, { "status": "affected", "version": "15.8(3)M4" }, { "status": "affected", "version": "15.8(3)M3a" }, { "status": "affected", "version": "15.8(3)M3b" }, { "status": "affected", "version": "15.8(3)M5" }, { "status": "affected", "version": "15.8(3)M6" }, { "status": "affected", "version": "15.8(3)M7" }, { "status": "affected", "version": "15.8(3)M8" }, { "status": "affected", "version": "15.8(3)M9" }, { "status": "affected", "version": "15.9(3)M" }, { "status": "affected", "version": "15.9(3)M1" }, { "status": "affected", "version": "15.9(3)M0a" }, { "status": "affected", "version": "15.9(3)M2" }, { "status": "affected", "version": "15.9(3)M3" }, { "status": "affected", "version": "15.9(3)M2a" }, { "status": "affected", "version": "15.9(3)M3a" }, { "status": "affected", "version": "15.9(3)M4" }, { "status": "affected", "version": "15.9(3)M3b" }, { "status": "affected", "version": "15.9(3)M5" }, { "status": "affected", "version": "15.9(3)M4a" }, { "status": "affected", "version": "15.9(3)M6" }, { "status": "affected", "version": "15.9(3)M7" }, { "status": "affected", "version": "15.9(3)M6a" }, { "status": "affected", "version": "15.9(3)M6b" }, { "status": "affected", "version": "15.9(3)M8" }, { "status": "affected", "version": "15.9(3)M7a" }, { "status": "affected", "version": "15.9(3)M9" }, { "status": "affected", "version": "15.9(3)M8b" }, { "status": "affected", "version": "15.9(3)M10" }, { "status": "affected", "version": "15.9(3)M11" } ] }, { "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.16.4.82" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.23.1" } ] }, { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.3.0SG" }, { "status": "affected", "version": "3.3.2SG" }, { "status": "affected", "version": "3.3.1SG" }, { "status": "affected", "version": "3.4.0SG" }, { "status": "affected", "version": "3.4.2SG" }, { "status": "affected", "version": "3.4.1SG" }, { "status": "affected", "version": "3.4.3SG" }, { "status": "affected", "version": "3.4.4SG" }, { "status": "affected", "version": "3.4.5SG" }, { "status": "affected", "version": "3.4.6SG" }, { "status": "affected", "version": "3.4.7SG" }, { "status": "affected", "version": "3.4.8SG" }, { "status": "affected", "version": "3.5.0E" }, { "status": "affected", "version": "3.5.1E" }, { "status": "affected", "version": "3.5.2E" }, { "status": "affected", "version": "3.5.3E" }, { "status": "affected", "version": "3.6.0E" }, { "status": "affected", "version": "3.6.1E" }, { "status": "affected", "version": "3.6.2aE" }, { "status": "affected", "version": "3.6.2E" }, { "status": "affected", "version": "3.6.3E" }, { "status": "affected", "version": "3.6.4E" }, { "status": "affected", "version": "3.6.5E" }, { "status": "affected", "version": "3.6.6E" }, { "status": "affected", "version": "3.6.5aE" }, { "status": "affected", "version": "3.6.5bE" }, { "status": "affected", "version": "3.6.7E" }, { "status": "affected", "version": "3.6.8E" }, { "status": "affected", "version": "3.6.7bE" }, { "status": "affected", "version": "3.6.9E" }, { "status": "affected", "version": "3.6.10E" }, { "status": "affected", "version": "3.7.0E" }, { "status": "affected", "version": "3.7.1E" }, { "status": "affected", "version": "3.7.2E" }, { "status": "affected", "version": "3.7.3E" }, { "status": "affected", "version": "3.7.4E" }, { "status": "affected", "version": "3.7.5E" }, { "status": "affected", "version": "3.8.0E" }, { "status": "affected", "version": "3.8.1E" }, { "status": "affected", "version": "3.8.2E" }, { "status": "affected", "version": "3.8.3E" }, { "status": "affected", "version": "3.8.4E" }, { "status": "affected", "version": "3.8.5E" }, { "status": "affected", "version": "3.8.5aE" }, { "status": "affected", "version": "3.8.6E" }, { "status": "affected", "version": "3.8.7E" }, { "status": "affected", "version": "3.8.8E" }, { "status": "affected", "version": "3.8.9E" }, { "status": "affected", "version": "3.8.10E" }, { "status": "affected", "version": "3.18.2aSP" }, { "status": "affected", "version": "3.9.0E" }, { "status": "affected", "version": "3.9.1E" }, { "status": "affected", "version": "3.9.2E" }, { "status": "affected", "version": "3.10.0E" }, { "status": "affected", "version": "3.10.1E" }, { "status": "affected", "version": "3.10.0cE" }, { "status": "affected", "version": "3.10.2E" }, { "status": "affected", "version": "3.10.3E" }, { "status": "affected", "version": "3.11.0E" }, { "status": "affected", "version": "3.11.1E" }, { "status": "affected", "version": "3.11.2E" }, { "status": "affected", "version": "3.11.3E" }, { "status": "affected", "version": "3.11.1aE" }, { "status": "affected", "version": "3.11.4E" }, { "status": "affected", "version": "3.11.3aE" }, { "status": "affected", "version": "3.11.5E" }, { "status": "affected", "version": "3.11.6E" }, { "status": "affected", "version": "3.11.7E" }, { "status": "affected", "version": "3.11.8E" }, { "status": "affected", "version": "3.11.9E" }, { "status": "affected", "version": "3.11.10E" }, { "status": "affected", "version": "3.11.11E" }, { "status": "affected", "version": "3.11.12E" }, { "status": "affected", "version": "17.6.1y" } ] }, { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco IOS Software, IOS XE Software, Secure Firewall Adaptive Security Appliance (ASA) Software, and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a lack of proper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. In the case of Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly. In the case of Cisco ASA and FTD Software, a successful exploit could allow the attacker to partially exhaust system memory, causing system instability such as being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:47:26.819Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy" } ], "source": { "advisory": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "defects": [ "CSCwo15022", "CSCwo20388" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20225", "datePublished": "2025-08-14T16:28:59.088Z", "dateReserved": "2024-10-10T19:15:13.235Z", "dateUpdated": "2025-08-14T19:20:27.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20306 (GCVE-0-2025-20306)
Vulnerability from cvelistv5
Published
2025-08-14 16:31
Modified
2025-08-16 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker with Administrator-level privileges to execute arbitrary commands on the underlying operating system.
This vulnerability is due to insufficient input validation of certain HTTP request parameters that are sent to the web-based management interface. An attacker could exploit this vulnerability by authenticating to the interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute commands as the root user on the affected device. To exploit this vulnerability, an attacker would need Administrator-level credentials.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.6.3 Version: 6.6.4 Version: 6.4.0.12 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.6.5.1 Version: 6.4.0.13 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.1.0.1 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.0.6.2 Version: 6.4.0.18 Version: 6.6.7.2 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.6.0 Version: 7.4.2 Version: 7.2.8.1 Version: 7.0.6.3 Version: 7.4.2.1 Version: 7.2.9 Version: 7.0.7 Version: 7.7.0 Version: 7.4.2.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20306", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-16T03:55:49.229Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Management Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.3.1" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.7.0" }, { "status": "affected", "version": "7.4.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker with Administrator-level privileges to execute arbitrary commands on the underlying operating system.\r\n\r\nThis vulnerability is due to insufficient input validation of certain HTTP request parameters that are sent to the web-based management interface. An attacker could exploit this vulnerability by authenticating to the interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute commands as the root\u0026nbsp;user on the affected device. To exploit this vulnerability, an attacker would need\u0026nbsp;Administrator-level credentials." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:31:25.343Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fmc-cmd-inj-HCRLpFyN", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-HCRLpFyN" } ], "source": { "advisory": "cisco-sa-fmc-cmd-inj-HCRLpFyN", "defects": [ "CSCwo20522" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Management Center Software Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20306", "datePublished": "2025-08-14T16:31:25.343Z", "dateReserved": "2024-10-10T19:15:13.253Z", "dateUpdated": "2025-08-16T03:55:49.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20235 (GCVE-0-2025-20235)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.6.3 Version: 6.6.4 Version: 6.4.0.12 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.6.5.1 Version: 6.4.0.13 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.1.0.1 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.0.6.2 Version: 6.4.0.18 Version: 6.6.7.2 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.6.0 Version: 7.4.2 Version: 7.2.8.1 Version: 7.0.6.3 Version: 7.4.2.1 Version: 7.2.9 Version: 7.0.7 Version: 7.4.2.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20235", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:39:52.978262Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:20:36.520Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Management Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.3.1" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.4.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:58.528Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fmc-xss-JtNmcusP", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-JtNmcusP" } ], "source": { "advisory": "cisco-sa-fmc-xss-JtNmcusP", "defects": [ "CSCwn48917" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20235", "datePublished": "2025-08-14T16:28:58.528Z", "dateReserved": "2024-10-10T19:15:13.237Z", "dateUpdated": "2025-08-14T19:20:36.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20127 (GCVE-0-2025-20127)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-404 - Improper Resource Shutdown or Release
Summary
A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.
This vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.
Note: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.20.1 Version: 9.20.1.5 Version: 9.20.2 Version: 9.20.2.10 Version: 9.20.2.21 Version: 9.20.2.22 Version: 9.20.3 Version: 9.22.1.1 Version: 9.20.3.4 Version: 9.20.3.7 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20127", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:41:43.684080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:21:36.390Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\r\n\r\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\r\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "Improper Resource Shutdown or Release", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:07.785Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-3100_4200_tlsdos-2yNSCd54", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54" } ], "source": { "advisory": "cisco-sa-3100_4200_tlsdos-2yNSCd54", "defects": [ "CSCwm91176" ], "discovery": "EXTERNAL" }, "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 3100 and 4200 Series TLS Cipher Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20127", "datePublished": "2025-08-14T16:28:07.785Z", "dateReserved": "2024-10-10T19:15:13.212Z", "dateUpdated": "2025-08-14T19:21:36.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20268 (GCVE-0-2025-20268)
Vulnerability from cvelistv5
Published
2025-08-14 16:30
Modified
2025-08-14 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-229 - Improper Handling of Values
Summary
A vulnerability in the Geolocation-Based Remote Access (RA) VPN feature of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies to allow or deny HTTP connections based on a country or region.
This vulnerability exists because the URL string is not fully parsed. An attacker could exploit this vulnerability by sending a crafted HTTP connection through the targeted device. A successful exploit could allow the attacker to bypass configured policies and gain access to a network where the connection should have been denied.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: 7.7.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20268", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:37:19.704659Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:18:58.227Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Geolocation-Based Remote Access (RA) VPN feature of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies to allow or deny HTTP connections based on a country or region.\r\n\r\nThis vulnerability exists because the URL string is not fully parsed. An attacker could exploit this vulnerability by sending a crafted HTTP connection through the targeted device. A successful exploit could allow the attacker to bypass configured policies and gain access to a network where the connection should have been denied." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-229", "description": "Improper Handling of Values", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:30:34.427Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ftd-ravpn-geobypass-9h38M37Z", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ravpn-geobypass-9h38M37Z" } ], "source": { "advisory": "cisco-sa-ftd-ravpn-geobypass-9h38M37Z", "defects": [ "CSCwo56698" ], "discovery": "EXTERNAL" }, "title": "Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20268", "datePublished": "2025-08-14T16:30:34.427Z", "dateReserved": "2024-10-10T19:15:13.244Z", "dateUpdated": "2025-08-14T19:18:58.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20253 (GCVE-0-2025-20253)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-14 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
A vulnerability in the IKEv2 feature of Cisco IOS Software, IOS XE Software, Secure Firewall ASA Software, and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a DoS condition.
This vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause an infinite loop that exhausts resources and could cause the device to reload.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.8.3 Version: 9.12.1 Version: 9.8.1 Version: 9.12.2 Version: 9.8.2.45 Version: 9.8.2 Version: 9.8.4 Version: 9.14.1 Version: 9.12.4 Version: 9.8.2.26 Version: 9.8.2.24 Version: 9.8.2.15 Version: 9.8.2.14 Version: 9.8.2.35 Version: 9.8.2.20 Version: 9.8.2.8 Version: 9.8.2.17 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.38 Version: 9.8.4.25 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.8.3.18 Version: 9.8.3.14 Version: 9.8.4.15 Version: 9.8.4.8 Version: 9.8.1.7 Version: 9.8.3.29 Version: 9.14.1.10 Version: 9.12.2.5 Version: 9.8.4.22 Version: 9.12.3.12 Version: 9.8.4.7 Version: 9.8.4.17 Version: 9.8.3.16 Version: 9.8.4.20 Version: 9.8.3.11 Version: 9.12.1.3 Version: 9.8.4.3 Version: 9.12.2.4 Version: 9.8.4.12 Version: 9.12.1.2 Version: 9.8.3.26 Version: 9.8.1.5 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.8.3.21 Version: 9.8.4.10 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.14.1.6 Version: 9.8.3.8 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.8.4.26 Version: 9.12.4.4 Version: 9.14.1.30 Version: 9.8.4.29 Version: 9.12.4.7 Version: 9.14.2 Version: 9.12.4.8 Version: 9.8.4.32 Version: 9.12.4.10 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.12.4.13 Version: 9.8.4.33 Version: 9.14.2.13 Version: 9.8.4.34 Version: 9.12.4.18 Version: 9.8.4.35 Version: 9.14.2.15 Version: 9.12.4.24 Version: 9.16.1 Version: 9.8.4.39 Version: 9.14.3 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.14.3.1 Version: 9.12.4.29 Version: 9.14.3.9 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.8.4.40 Version: 9.14.3.11 Version: 9.12.4.35 Version: 9.8.4.41 Version: 9.14.3.13 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.14.3.15 Version: 9.17.1 Version: 9.16.2.11 Version: 9.14.3.18 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.8.4.43 Version: 9.14.4 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.14.4.6 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.8.4.44 Version: 9.18.1 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.17.1.15 Version: 9.8.4.45 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.8.4.46 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.14.4.22 Version: 9.16.4.14 Version: 9.8.4.48 Version: 9.18.3 Version: 9.19.1.5 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.16.4.18 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.14.4.24 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.18.4.34 Version: 9.20.3 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.18.4.40 Version: 9.23.1 Version: 9.22.1.1 Version: 9.16.4.71 Version: 9.20.3.4 Version: 9.18.4.47 Version: 9.20.3.7 Version: 9.17.1.45 Version: 9.19.1.37 Version: 9.17.1.46 Version: 9.16.4.76 Version: 9.20.3.9 Version: 9.19.1.38 Version: 9.18.4.50 Version: 9.22.1.3 Version: 9.20.3.10 Version: 9.22.1.2 Version: 9.18.4.52 Version: 9.20.3.13 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20253", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:38:04.287182Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:19:22.460Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.23.1" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.20.3.13" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.7.0" }, { "status": "affected", "version": "7.4.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the IKEv2 feature of Cisco IOS Software, IOS XE Software, Secure Firewall ASA Software, and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a DoS condition.\r\n\r\nThis vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause an infinite loop that exhausts resources and could cause the device to reload." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:29:43.673Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy" } ], "source": { "advisory": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "defects": [ "CSCwn73399" ], "discovery": "INTERNAL" }, "title": "Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20253", "datePublished": "2025-08-14T16:29:43.673Z", "dateReserved": "2024-10-10T19:15:13.241Z", "dateUpdated": "2025-08-14T19:19:22.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20254 (GCVE-0-2025-20254)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-14 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.1 Version: 9.12.1.2 Version: 9.12.1.3 Version: 9.12.2 Version: 9.12.2.4 Version: 9.12.2.5 Version: 9.12.2.9 Version: 9.12.3 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.12.4 Version: 9.12.3.12 Version: 9.12.3.9 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.12.4.4 Version: 9.12.4.7 Version: 9.12.4.10 Version: 9.12.4.13 Version: 9.12.4.8 Version: 9.12.4.18 Version: 9.12.4.24 Version: 9.12.4.26 Version: 9.12.4.29 Version: 9.12.4.30 Version: 9.12.4.35 Version: 9.12.4.37 Version: 9.12.4.38 Version: 9.12.4.39 Version: 9.12.4.40 Version: 9.12.4.41 Version: 9.12.4.47 Version: 9.12.4.48 Version: 9.12.4.50 Version: 9.12.4.52 Version: 9.12.4.54 Version: 9.12.4.55 Version: 9.12.4.56 Version: 9.12.4.58 Version: 9.12.4.62 Version: 9.12.4.65 Version: 9.12.4.67 Version: 9.14.1 Version: 9.14.1.10 Version: 9.14.1.6 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.14.1.30 Version: 9.14.2 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.14.2.13 Version: 9.14.2.15 Version: 9.14.3 Version: 9.14.3.1 Version: 9.14.3.9 Version: 9.14.3.11 Version: 9.14.3.13 Version: 9.14.3.18 Version: 9.14.3.15 Version: 9.14.4 Version: 9.14.4.6 Version: 9.14.4.7 Version: 9.14.4.12 Version: 9.14.4.13 Version: 9.14.4.14 Version: 9.14.4.15 Version: 9.14.4.17 Version: 9.14.4.22 Version: 9.14.4.23 Version: 9.14.4.24 Version: 9.16.1 Version: 9.16.1.28 Version: 9.16.2 Version: 9.16.2.3 Version: 9.16.2.7 Version: 9.16.2.11 Version: 9.16.2.13 Version: 9.16.2.14 Version: 9.16.3 Version: 9.16.3.3 Version: 9.16.3.14 Version: 9.16.3.15 Version: 9.16.3.19 Version: 9.16.3.23 Version: 9.16.4 Version: 9.16.4.9 Version: 9.16.4.14 Version: 9.16.4.18 Version: 9.16.4.19 Version: 9.16.4.27 Version: 9.16.4.38 Version: 9.16.4.39 Version: 9.16.4.42 Version: 9.16.4.48 Version: 9.16.4.55 Version: 9.16.4.57 Version: 9.16.4.61 Version: 9.16.4.62 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.16.4.71 Version: 9.16.4.76 Version: 9.16.4.82 Version: 9.17.1 Version: 9.17.1.7 Version: 9.17.1.9 Version: 9.17.1.10 Version: 9.17.1.11 Version: 9.17.1.13 Version: 9.17.1.15 Version: 9.17.1.20 Version: 9.17.1.30 Version: 9.17.1.33 Version: 9.17.1.39 Version: 9.17.1.45 Version: 9.17.1.46 Version: 9.18.1 Version: 9.18.1.3 Version: 9.18.2 Version: 9.18.2.5 Version: 9.18.2.7 Version: 9.18.2.8 Version: 9.18.3 Version: 9.18.3.39 Version: 9.18.3.46 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.18.3.56 Version: 9.18.4 Version: 9.18.4.5 Version: 9.18.4.8 Version: 9.18.4.22 Version: 9.18.4.24 Version: 9.18.4.29 Version: 9.18.4.34 Version: 9.18.4.40 Version: 9.18.4.47 Version: 9.18.4.50 Version: 9.18.4.52 Version: 9.18.4.53 Version: 9.19.1 Version: 9.19.1.5 Version: 9.19.1.9 Version: 9.19.1.12 Version: 9.19.1.18 Version: 9.19.1.22 Version: 9.19.1.24 Version: 9.19.1.27 Version: 9.19.1.28 Version: 9.19.1.31 Version: 9.19.1.37 Version: 9.19.1.38 Version: 9.20.1 Version: 9.20.1.5 Version: 9.20.2 Version: 9.20.2.10 Version: 9.20.2.21 Version: 9.20.2.22 Version: 9.20.3 Version: 9.20.3.4 Version: 9.20.3.7 Version: 9.20.3.9 Version: 9.20.3.10 Version: 9.20.3.13 Version: 9.22.1.1 Version: 9.22.1.3 Version: 9.22.1.2 Version: 9.22.1.6 Version: 9.23.1 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20254", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:37:31.427730Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:19:07.381Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.16.4.82" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.23.1" } ] }, { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:45:37.949Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy" } ], "source": { "advisory": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "defects": [ "CSCwo15021" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20254", "datePublished": "2025-08-14T16:29:54.267Z", "dateReserved": "2024-10-10T19:15:13.241Z", "dateUpdated": "2025-08-14T19:19:07.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20252 (GCVE-0-2025-20252)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-14 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.8.4.15 Version: 9.8.4.17 Version: 9.8.4.25 Version: 9.8.4.20 Version: 9.8.4.22 Version: 9.8.4.26 Version: 9.8.4.29 Version: 9.8.4.32 Version: 9.8.4.33 Version: 9.8.4.34 Version: 9.8.4.35 Version: 9.8.4.39 Version: 9.8.4.40 Version: 9.8.4.41 Version: 9.8.4.43 Version: 9.8.4.44 Version: 9.8.4.45 Version: 9.8.4.46 Version: 9.8.4.48 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.12.4 Version: 9.12.3.12 Version: 9.12.3.9 Version: 9.12.4.2 Version: 9.12.4.4 Version: 9.12.4.7 Version: 9.12.4.10 Version: 9.12.4.13 Version: 9.12.4.8 Version: 9.12.4.18 Version: 9.12.4.24 Version: 9.12.4.26 Version: 9.12.4.29 Version: 9.12.4.30 Version: 9.12.4.35 Version: 9.12.4.37 Version: 9.12.4.38 Version: 9.12.4.39 Version: 9.12.4.40 Version: 9.12.4.41 Version: 9.12.4.47 Version: 9.12.4.48 Version: 9.12.4.50 Version: 9.12.4.52 Version: 9.12.4.54 Version: 9.12.4.55 Version: 9.12.4.56 Version: 9.12.4.58 Version: 9.12.4.62 Version: 9.12.4.65 Version: 9.12.4.67 Version: 9.14.1 Version: 9.14.1.10 Version: 9.14.1.6 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.14.1.30 Version: 9.14.2 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.14.2.13 Version: 9.14.2.15 Version: 9.14.3 Version: 9.14.3.1 Version: 9.14.3.9 Version: 9.14.3.11 Version: 9.14.3.13 Version: 9.14.3.18 Version: 9.14.3.15 Version: 9.14.4 Version: 9.14.4.6 Version: 9.14.4.7 Version: 9.14.4.12 Version: 9.14.4.13 Version: 9.14.4.14 Version: 9.14.4.15 Version: 9.14.4.17 Version: 9.14.4.22 Version: 9.14.4.23 Version: 9.14.4.24 Version: 9.16.1 Version: 9.16.1.28 Version: 9.16.2 Version: 9.16.2.3 Version: 9.16.2.7 Version: 9.16.2.11 Version: 9.16.2.13 Version: 9.16.2.14 Version: 9.16.3 Version: 9.16.3.3 Version: 9.16.3.14 Version: 9.16.3.15 Version: 9.16.3.19 Version: 9.16.3.23 Version: 9.16.4 Version: 9.16.4.9 Version: 9.16.4.14 Version: 9.16.4.18 Version: 9.16.4.19 Version: 9.16.4.27 Version: 9.16.4.38 Version: 9.16.4.39 Version: 9.16.4.42 Version: 9.16.4.48 Version: 9.16.4.55 Version: 9.16.4.57 Version: 9.16.4.61 Version: 9.16.4.62 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.16.4.71 Version: 9.16.4.76 Version: 9.16.4.82 Version: 9.17.1 Version: 9.17.1.7 Version: 9.17.1.9 Version: 9.17.1.10 Version: 9.17.1.11 Version: 9.17.1.13 Version: 9.17.1.15 Version: 9.17.1.20 Version: 9.17.1.30 Version: 9.17.1.33 Version: 9.17.1.39 Version: 9.17.1.45 Version: 9.17.1.46 Version: 9.18.1 Version: 9.18.1.3 Version: 9.18.2 Version: 9.18.2.5 Version: 9.18.2.7 Version: 9.18.2.8 Version: 9.18.3 Version: 9.18.3.39 Version: 9.18.3.46 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.18.3.56 Version: 9.18.4 Version: 9.18.4.5 Version: 9.18.4.8 Version: 9.18.4.22 Version: 9.18.4.24 Version: 9.18.4.29 Version: 9.18.4.34 Version: 9.18.4.40 Version: 9.18.4.47 Version: 9.18.4.50 Version: 9.18.4.52 Version: 9.18.4.53 Version: 9.19.1 Version: 9.19.1.5 Version: 9.19.1.9 Version: 9.19.1.12 Version: 9.19.1.18 Version: 9.19.1.22 Version: 9.19.1.24 Version: 9.19.1.27 Version: 9.19.1.28 Version: 9.19.1.31 Version: 9.19.1.37 Version: 9.19.1.38 Version: 9.20.1 Version: 9.20.1.5 Version: 9.20.2 Version: 9.20.2.10 Version: 9.20.2.21 Version: 9.20.2.22 Version: 9.20.3 Version: 9.20.3.4 Version: 9.20.3.7 Version: 9.20.3.9 Version: 9.20.3.10 Version: 9.20.3.13 Version: 9.22.1.1 Version: 9.22.1.3 Version: 9.22.1.2 Version: 9.22.1.6 Version: 9.23.1 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20252", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:38:19.158928Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:19:30.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.16.4.82" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.23.1" } ] }, { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:45:18.878Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy" } ], "source": { "advisory": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "defects": [ "CSCwo15024" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20252", "datePublished": "2025-08-14T16:29:39.551Z", "dateReserved": "2024-10-10T19:15:13.241Z", "dateUpdated": "2025-08-14T19:19:30.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20148 (GCVE-0-2025-20148)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document.
This vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, read arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Security Analyst (Read Only).
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.4.0 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.0.6.2 Version: 7.2.7 Version: 7.2.5.2 Version: 7.2.8 Version: 7.4.2 Version: 7.2.8.1 Version: 7.0.6.3 Version: 7.4.2.1 Version: 7.2.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20148", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:41:04.289481Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:21:14.099Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Management Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document.\r\n\r\nThis vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, read arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Security Analyst (Read Only)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:24.190Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fmc-html-inj-MqjrZrny", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny" } ], "source": { "advisory": "cisco-sa-fmc-html-inj-MqjrZrny", "defects": [ "CSCwk85702" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Management Center HTML Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20148", "datePublished": "2025-08-14T16:28:24.190Z", "dateReserved": "2024-10-10T19:15:13.215Z", "dateUpdated": "2025-08-14T19:21:14.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20244 (GCVE-0-2025-20244)
Vulnerability from cvelistv5
Published
2025-08-14 16:29
Modified
2025-08-14 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1287 - Improper Validation of Specified Type of Input
Summary
A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow a remote attacker that is authenticated as a VPN user to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to incomplete error checking when parsing an HTTP header field value. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted Remote Access SSL VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition, which would cause the affected device to reload.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.12.3 Version: 9.8.3 Version: 9.12.1 Version: 9.8.1 Version: 9.12.2 Version: 9.8.2.45 Version: 9.8.2 Version: 9.8.4 Version: 9.14.1 Version: 9.12.4 Version: 9.8.2.26 Version: 9.8.2.24 Version: 9.8.2.15 Version: 9.8.2.14 Version: 9.8.2.35 Version: 9.8.2.20 Version: 9.8.2.8 Version: 9.8.2.17 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.38 Version: 9.8.4.25 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.8.3.18 Version: 9.8.3.14 Version: 9.8.4.15 Version: 9.8.4.8 Version: 9.8.1.7 Version: 9.8.3.29 Version: 9.14.1.10 Version: 9.12.2.5 Version: 9.8.4.22 Version: 9.12.3.12 Version: 9.8.4.7 Version: 9.8.4.17 Version: 9.8.3.16 Version: 9.8.4.20 Version: 9.8.3.11 Version: 9.12.1.3 Version: 9.8.4.3 Version: 9.12.2.4 Version: 9.8.4.12 Version: 9.12.1.2 Version: 9.8.3.26 Version: 9.8.1.5 Version: 9.12.2.9 Version: 9.12.3.9 Version: 9.8.3.21 Version: 9.8.4.10 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.14.1.6 Version: 9.8.3.8 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.8.4.26 Version: 9.12.4.4 Version: 9.14.1.30 Version: 9.8.4.29 Version: 9.12.4.7 Version: 9.14.2 Version: 9.12.4.8 Version: 9.8.4.32 Version: 9.12.4.10 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.12.4.13 Version: 9.8.4.33 Version: 9.14.2.13 Version: 9.8.4.34 Version: 9.12.4.18 Version: 9.8.4.35 Version: 9.14.2.15 Version: 9.12.4.24 Version: 9.16.1 Version: 9.8.4.39 Version: 9.14.3 Version: 9.12.4.26 Version: 9.16.1.28 Version: 9.14.3.1 Version: 9.12.4.29 Version: 9.14.3.9 Version: 9.16.2 Version: 9.12.4.30 Version: 9.16.2.3 Version: 9.8.4.40 Version: 9.14.3.11 Version: 9.12.4.35 Version: 9.8.4.41 Version: 9.14.3.13 Version: 9.16.2.7 Version: 9.12.4.37 Version: 9.14.3.15 Version: 9.17.1 Version: 9.16.2.11 Version: 9.14.3.18 Version: 9.16.2.13 Version: 9.12.4.39 Version: 9.12.4.38 Version: 9.8.4.43 Version: 9.14.4 Version: 9.16.2.14 Version: 9.17.1.7 Version: 9.12.4.40 Version: 9.16.3.3 Version: 9.14.4.6 Version: 9.16.3 Version: 9.16.3.14 Version: 9.17.1.9 Version: 9.14.4.7 Version: 9.12.4.41 Version: 9.17.1.10 Version: 9.8.4.44 Version: 9.18.1 Version: 9.12.4.47 Version: 9.14.4.12 Version: 9.16.3.15 Version: 9.18.1.3 Version: 9.17.1.11 Version: 9.12.4.48 Version: 9.14.4.13 Version: 9.18.2 Version: 9.16.3.19 Version: 9.17.1.13 Version: 9.12.4.50 Version: 9.14.4.14 Version: 9.17.1.15 Version: 9.8.4.45 Version: 9.12.4.52 Version: 9.14.4.15 Version: 9.16.3.23 Version: 9.18.2.5 Version: 9.16.4 Version: 9.12.4.54 Version: 9.14.4.17 Version: 9.8.4.46 Version: 9.17.1.20 Version: 9.18.2.7 Version: 9.19.1 Version: 9.16.4.9 Version: 9.12.4.55 Version: 9.18.2.8 Version: 9.14.4.22 Version: 9.16.4.14 Version: 9.8.4.48 Version: 9.18.3 Version: 9.19.1.5 Version: 9.14.4.23 Version: 9.12.4.56 Version: 9.16.4.18 Version: 9.17.1.30 Version: 9.19.1.9 Version: 9.18.3.39 Version: 9.16.4.19 Version: 9.12.4.58 Version: 9.19.1.12 Version: 9.18.3.46 Version: 9.16.4.27 Version: 9.19.1.18 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.16.4.38 Version: 9.17.1.33 Version: 9.12.4.62 Version: 9.16.4.39 Version: 9.18.3.56 Version: 9.20.1 Version: 9.16.4.42 Version: 9.19.1.22 Version: 9.18.4 Version: 9.20.1.5 Version: 9.18.4.5 Version: 9.19.1.24 Version: 9.16.4.48 Version: 9.18.4.8 Version: 9.20.2 Version: 9.19.1.27 Version: 9.12.4.65 Version: 9.16.4.55 Version: 9.18.4.22 Version: 9.20.2.10 Version: 9.16.4.57 Version: 9.19.1.28 Version: 9.17.1.39 Version: 9.12.4.67 Version: 9.14.4.24 Version: 9.18.4.24 Version: 9.20.2.21 Version: 9.16.4.61 Version: 9.19.1.31 Version: 9.18.4.29 Version: 9.20.2.22 Version: 9.16.4.62 Version: 9.18.4.34 Version: 9.20.3 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.18.4.40 Version: 9.22.1.1 Version: 9.16.4.71 Version: 9.20.3.4 Version: 9.16.4.76 Version: 9.22.1.2 Version: 9.16.4.82 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20244", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:38:58.710669Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:19:47.292Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.16.4.82" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.4.2.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow a remote attacker that is authenticated as a VPN user to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to incomplete error checking when parsing an HTTP header field value. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted Remote Access SSL VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition, which would cause the affected device to reload." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1287", "description": "Improper Validation of Specified Type of Input", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:29:29.694Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX" } ], "source": { "advisory": "cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX", "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20244", "datePublished": "2025-08-14T16:29:29.694Z", "dateReserved": "2024-10-10T19:15:13.238Z", "dateUpdated": "2025-08-14T19:19:47.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20217 (GCVE-0-2025-20217)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
A vulnerability in the packet inspection functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to incorrect processing of traffic that is inspected by an affected device. An attacker could exploit this vulnerability by sending crafted traffic through the affected device. A successful exploit could allow the attacker to cause the affected device to enter an infinite loop while inspecting traffic, resulting in a DoS condition. The system watchdog will restart the Snort process automatically.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Threat Defense Software |
Version: 7.1.0 Version: 7.1.0.1 Version: 7.2.0 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.2.1 Version: 7.3.0 Version: 7.2.2 Version: 7.2.3 Version: 7.3.1 Version: 7.1.0.3 Version: 7.2.4 Version: 7.2.5 Version: 7.2.4.1 Version: 7.3.1.1 Version: 7.4.0 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.6.0 Version: 7.4.2 Version: 7.2.8.1 Version: 7.4.2.1 Version: 7.2.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20217", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:40:53.038697Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:21:06.866Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the packet inspection functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to incorrect processing of traffic that is inspected by an affected device. An attacker could exploit this vulnerability by sending crafted traffic through the affected device. A successful exploit could allow the attacker to cause the affected device to enter an infinite loop while inspecting traffic, resulting in a DoS condition. The system watchdog will restart the Snort process automatically." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:28:27.204Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ftd-dos-SvKhtjgt", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt" } ], "source": { "advisory": "cisco-sa-ftd-dos-SvKhtjgt", "defects": [ "CSCwm44719" ], "discovery": "INTERNAL" }, "title": "Cisco Firepower Threat Defense Intrusion Detection Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20217", "datePublished": "2025-08-14T16:28:27.204Z", "dateReserved": "2024-10-10T19:15:13.232Z", "dateUpdated": "2025-08-14T19:21:06.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20224 (GCVE-0-2025-20224)
Vulnerability from cvelistv5
Published
2025-08-14 16:28
Modified
2025-08-14 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.8.1 Version: 9.8.1.5 Version: 9.8.1.7 Version: 9.8.2 Version: 9.8.2.8 Version: 9.8.2.14 Version: 9.8.2.15 Version: 9.8.2.17 Version: 9.8.2.20 Version: 9.8.2.24 Version: 9.8.2.26 Version: 9.8.2.28 Version: 9.8.2.33 Version: 9.8.2.35 Version: 9.8.2.38 Version: 9.8.3.8 Version: 9.8.3.11 Version: 9.8.3.14 Version: 9.8.3.16 Version: 9.8.3.18 Version: 9.8.3.21 Version: 9.8.3 Version: 9.8.3.26 Version: 9.8.3.29 Version: 9.8.4 Version: 9.8.4.3 Version: 9.8.4.7 Version: 9.8.4.8 Version: 9.8.4.10 Version: 9.8.4.12 Version: 9.8.4.15 Version: 9.8.4.17 Version: 9.8.2.45 Version: 9.8.4.25 Version: 9.8.4.20 Version: 9.8.4.22 Version: 9.8.4.26 Version: 9.8.4.29 Version: 9.8.4.32 Version: 9.8.4.33 Version: 9.8.4.34 Version: 9.8.4.35 Version: 9.8.4.39 Version: 9.8.4.40 Version: 9.8.4.41 Version: 9.8.4.43 Version: 9.8.4.44 Version: 9.8.4.45 Version: 9.8.4.46 Version: 9.8.4.48 Version: 9.12.1 Version: 9.12.1.2 Version: 9.12.1.3 Version: 9.12.2 Version: 9.12.2.4 Version: 9.12.2.5 Version: 9.12.2.9 Version: 9.12.3 Version: 9.12.3.2 Version: 9.12.3.7 Version: 9.12.4 Version: 9.12.3.12 Version: 9.12.3.9 Version: 9.12.2.1 Version: 9.12.4.2 Version: 9.12.4.4 Version: 9.12.4.7 Version: 9.12.4.10 Version: 9.12.4.13 Version: 9.12.4.8 Version: 9.12.4.18 Version: 9.12.4.24 Version: 9.12.4.26 Version: 9.12.4.29 Version: 9.12.4.30 Version: 9.12.4.35 Version: 9.12.4.37 Version: 9.12.4.38 Version: 9.12.4.39 Version: 9.12.4.40 Version: 9.12.4.41 Version: 9.12.4.47 Version: 9.12.4.48 Version: 9.12.4.50 Version: 9.12.4.52 Version: 9.12.4.54 Version: 9.12.4.55 Version: 9.12.4.56 Version: 9.12.4.58 Version: 9.12.4.62 Version: 9.12.4.65 Version: 9.12.4.67 Version: 9.14.1 Version: 9.14.1.10 Version: 9.14.1.6 Version: 9.14.1.15 Version: 9.14.1.19 Version: 9.14.1.30 Version: 9.14.2 Version: 9.14.2.4 Version: 9.14.2.8 Version: 9.14.2.13 Version: 9.14.2.15 Version: 9.14.3 Version: 9.14.3.1 Version: 9.14.3.9 Version: 9.14.3.11 Version: 9.14.3.13 Version: 9.14.3.18 Version: 9.14.3.15 Version: 9.14.4 Version: 9.14.4.6 Version: 9.14.4.7 Version: 9.14.4.12 Version: 9.14.4.13 Version: 9.14.4.14 Version: 9.14.4.15 Version: 9.14.4.17 Version: 9.14.4.22 Version: 9.14.4.23 Version: 9.14.4.24 Version: 9.16.1 Version: 9.16.1.28 Version: 9.16.2 Version: 9.16.2.3 Version: 9.16.2.7 Version: 9.16.2.11 Version: 9.16.2.13 Version: 9.16.2.14 Version: 9.16.3 Version: 9.16.3.3 Version: 9.16.3.14 Version: 9.16.3.15 Version: 9.16.3.19 Version: 9.16.3.23 Version: 9.16.4 Version: 9.16.4.9 Version: 9.16.4.14 Version: 9.16.4.18 Version: 9.16.4.19 Version: 9.16.4.27 Version: 9.16.4.38 Version: 9.16.4.39 Version: 9.16.4.42 Version: 9.16.4.48 Version: 9.16.4.55 Version: 9.16.4.57 Version: 9.16.4.61 Version: 9.16.4.62 Version: 9.16.4.67 Version: 9.16.4.70 Version: 9.16.4.71 Version: 9.16.4.76 Version: 9.16.4.82 Version: 9.17.1 Version: 9.17.1.7 Version: 9.17.1.9 Version: 9.17.1.10 Version: 9.17.1.11 Version: 9.17.1.13 Version: 9.17.1.15 Version: 9.17.1.20 Version: 9.17.1.30 Version: 9.17.1.33 Version: 9.17.1.39 Version: 9.17.1.45 Version: 9.17.1.46 Version: 9.18.1 Version: 9.18.1.3 Version: 9.18.2 Version: 9.18.2.5 Version: 9.18.2.7 Version: 9.18.2.8 Version: 9.18.3 Version: 9.18.3.39 Version: 9.18.3.46 Version: 9.18.3.53 Version: 9.18.3.55 Version: 9.18.3.56 Version: 9.18.4 Version: 9.18.4.5 Version: 9.18.4.8 Version: 9.18.4.22 Version: 9.18.4.24 Version: 9.18.4.29 Version: 9.18.4.34 Version: 9.18.4.40 Version: 9.18.4.47 Version: 9.18.4.50 Version: 9.18.4.52 Version: 9.18.4.53 Version: 9.19.1 Version: 9.19.1.5 Version: 9.19.1.9 Version: 9.19.1.12 Version: 9.19.1.18 Version: 9.19.1.22 Version: 9.19.1.24 Version: 9.19.1.27 Version: 9.19.1.28 Version: 9.19.1.31 Version: 9.19.1.37 Version: 9.19.1.38 Version: 9.20.1 Version: 9.20.1.5 Version: 9.20.2 Version: 9.20.2.10 Version: 9.20.2.21 Version: 9.20.2.22 Version: 9.20.3 Version: 9.20.3.4 Version: 9.20.3.7 Version: 9.20.3.9 Version: 9.20.3.10 Version: 9.20.3.13 Version: 9.22.1.1 Version: 9.22.1.3 Version: 9.22.1.2 Version: 9.22.1.6 Version: 9.23.1 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20224", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:40:07.782513Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:20:44.180Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.8.1.5" }, { "status": "affected", "version": "9.8.1.7" }, { "status": "affected", "version": "9.8.2" }, { "status": "affected", "version": "9.8.2.8" }, { "status": "affected", "version": "9.8.2.14" }, { "status": "affected", "version": "9.8.2.15" }, { "status": "affected", "version": "9.8.2.17" }, { "status": "affected", "version": "9.8.2.20" }, { "status": "affected", "version": "9.8.2.24" }, { "status": "affected", "version": "9.8.2.26" }, { "status": "affected", "version": "9.8.2.28" }, { "status": "affected", "version": "9.8.2.33" }, { "status": "affected", "version": "9.8.2.35" }, { "status": "affected", "version": "9.8.2.38" }, { "status": "affected", "version": "9.8.3.8" }, { "status": "affected", "version": "9.8.3.11" }, { "status": "affected", "version": "9.8.3.14" }, { "status": "affected", "version": "9.8.3.16" }, { "status": "affected", "version": "9.8.3.18" }, { "status": "affected", "version": "9.8.3.21" }, { "status": "affected", "version": "9.8.3" }, { "status": "affected", "version": "9.8.3.26" }, { "status": "affected", "version": "9.8.3.29" }, { "status": "affected", "version": "9.8.4" }, { "status": "affected", "version": "9.8.4.3" }, { "status": "affected", "version": "9.8.4.7" }, { "status": "affected", "version": "9.8.4.8" }, { "status": "affected", "version": "9.8.4.10" }, { "status": "affected", "version": "9.8.4.12" }, { "status": "affected", "version": "9.8.4.15" }, { "status": "affected", "version": "9.8.4.17" }, { "status": "affected", "version": "9.8.2.45" }, { "status": "affected", "version": "9.8.4.25" }, { "status": "affected", "version": "9.8.4.20" }, { "status": "affected", "version": "9.8.4.22" }, { "status": "affected", "version": "9.8.4.26" }, { "status": "affected", "version": "9.8.4.29" }, { "status": "affected", "version": "9.8.4.32" }, { "status": "affected", "version": "9.8.4.33" }, { "status": "affected", "version": "9.8.4.34" }, { "status": "affected", "version": "9.8.4.35" }, { "status": "affected", "version": "9.8.4.39" }, { "status": "affected", "version": "9.8.4.40" }, { "status": "affected", "version": "9.8.4.41" }, { "status": "affected", "version": "9.8.4.43" }, { "status": "affected", "version": "9.8.4.44" }, { "status": "affected", "version": "9.8.4.45" }, { "status": "affected", "version": "9.8.4.46" }, { "status": "affected", "version": "9.8.4.48" }, { "status": "affected", "version": "9.12.1" }, { "status": "affected", "version": "9.12.1.2" }, { "status": "affected", "version": "9.12.1.3" }, { "status": "affected", "version": "9.12.2" }, { "status": "affected", "version": "9.12.2.4" }, { "status": "affected", "version": "9.12.2.5" }, { "status": "affected", "version": "9.12.2.9" }, { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.12.3.2" }, { "status": "affected", "version": "9.12.3.7" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.3.12" }, { "status": "affected", "version": "9.12.3.9" }, { "status": "affected", "version": "9.12.2.1" }, { "status": "affected", "version": "9.12.4.2" }, { "status": "affected", "version": "9.12.4.4" }, { "status": "affected", "version": "9.12.4.7" }, { "status": "affected", "version": "9.12.4.10" }, { "status": "affected", "version": "9.12.4.13" }, { "status": "affected", "version": "9.12.4.8" }, { "status": "affected", "version": "9.12.4.18" }, { "status": "affected", "version": "9.12.4.24" }, { "status": "affected", "version": "9.12.4.26" }, { "status": "affected", "version": "9.12.4.29" }, { "status": "affected", "version": "9.12.4.30" }, { "status": "affected", "version": "9.12.4.35" }, { "status": "affected", "version": "9.12.4.37" }, { "status": "affected", "version": "9.12.4.38" }, { "status": "affected", "version": "9.12.4.39" }, { "status": "affected", "version": "9.12.4.40" }, { "status": "affected", "version": "9.12.4.41" }, { "status": "affected", "version": "9.12.4.47" }, { "status": "affected", "version": "9.12.4.48" }, { "status": "affected", "version": "9.12.4.50" }, { "status": "affected", "version": "9.12.4.52" }, { "status": "affected", "version": "9.12.4.54" }, { "status": "affected", "version": "9.12.4.55" }, { "status": "affected", "version": "9.12.4.56" }, { "status": "affected", "version": "9.12.4.58" }, { "status": "affected", "version": "9.12.4.62" }, { "status": "affected", "version": "9.12.4.65" }, { "status": "affected", "version": "9.12.4.67" }, { "status": "affected", "version": "9.14.1" }, { "status": "affected", "version": "9.14.1.10" }, { "status": "affected", "version": "9.14.1.6" }, { "status": "affected", "version": "9.14.1.15" }, { "status": "affected", "version": "9.14.1.19" }, { "status": "affected", "version": "9.14.1.30" }, { "status": "affected", "version": "9.14.2" }, { "status": "affected", "version": "9.14.2.4" }, { "status": "affected", "version": "9.14.2.8" }, { "status": "affected", "version": "9.14.2.13" }, { "status": "affected", "version": "9.14.2.15" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.3.1" }, { "status": "affected", "version": "9.14.3.9" }, { "status": "affected", "version": "9.14.3.11" }, { "status": "affected", "version": "9.14.3.13" }, { "status": "affected", "version": "9.14.3.18" }, { "status": "affected", "version": "9.14.3.15" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.4.6" }, { "status": "affected", "version": "9.14.4.7" }, { "status": "affected", "version": "9.14.4.12" }, { "status": "affected", "version": "9.14.4.13" }, { "status": "affected", "version": "9.14.4.14" }, { "status": "affected", "version": "9.14.4.15" }, { "status": "affected", "version": "9.14.4.17" }, { "status": "affected", "version": "9.14.4.22" }, { "status": "affected", "version": "9.14.4.23" }, { "status": "affected", "version": "9.14.4.24" }, { "status": "affected", "version": "9.16.1" }, { "status": "affected", "version": "9.16.1.28" }, { "status": "affected", "version": "9.16.2" }, { "status": "affected", "version": "9.16.2.3" }, { "status": "affected", "version": "9.16.2.7" }, { "status": "affected", "version": "9.16.2.11" }, { "status": "affected", "version": "9.16.2.13" }, { "status": "affected", "version": "9.16.2.14" }, { "status": "affected", "version": "9.16.3" }, { "status": "affected", "version": "9.16.3.3" }, { "status": "affected", "version": "9.16.3.14" }, { "status": "affected", "version": "9.16.3.15" }, { "status": "affected", "version": "9.16.3.19" }, { "status": "affected", "version": "9.16.3.23" }, { "status": "affected", "version": "9.16.4" }, { "status": "affected", "version": "9.16.4.9" }, { "status": "affected", "version": "9.16.4.14" }, { "status": "affected", "version": "9.16.4.18" }, { "status": "affected", "version": "9.16.4.19" }, { "status": "affected", "version": "9.16.4.27" }, { "status": "affected", "version": "9.16.4.38" }, { "status": "affected", "version": "9.16.4.39" }, { "status": "affected", "version": "9.16.4.42" }, { "status": "affected", "version": "9.16.4.48" }, { "status": "affected", "version": "9.16.4.55" }, { "status": "affected", "version": "9.16.4.57" }, { "status": "affected", "version": "9.16.4.61" }, { "status": "affected", "version": "9.16.4.62" }, { "status": "affected", "version": "9.16.4.67" }, { "status": "affected", "version": "9.16.4.70" }, { "status": "affected", "version": "9.16.4.71" }, { "status": "affected", "version": "9.16.4.76" }, { "status": "affected", "version": "9.16.4.82" }, { "status": "affected", "version": "9.17.1" }, { "status": "affected", "version": "9.17.1.7" }, { "status": "affected", "version": "9.17.1.9" }, { "status": "affected", "version": "9.17.1.10" }, { "status": "affected", "version": "9.17.1.11" }, { "status": "affected", "version": "9.17.1.13" }, { "status": "affected", "version": "9.17.1.15" }, { "status": "affected", "version": "9.17.1.20" }, { "status": "affected", "version": "9.17.1.30" }, { "status": "affected", "version": "9.17.1.33" }, { "status": "affected", "version": "9.17.1.39" }, { "status": "affected", "version": "9.17.1.45" }, { "status": "affected", "version": "9.17.1.46" }, { "status": "affected", "version": "9.18.1" }, { "status": "affected", "version": "9.18.1.3" }, { "status": "affected", "version": "9.18.2" }, { "status": "affected", "version": "9.18.2.5" }, { "status": "affected", "version": "9.18.2.7" }, { "status": "affected", "version": "9.18.2.8" }, { "status": "affected", "version": "9.18.3" }, { "status": "affected", "version": "9.18.3.39" }, { "status": "affected", "version": "9.18.3.46" }, { "status": "affected", "version": "9.18.3.53" }, { "status": "affected", "version": "9.18.3.55" }, { "status": "affected", "version": "9.18.3.56" }, { "status": "affected", "version": "9.18.4" }, { "status": "affected", "version": "9.18.4.5" }, { "status": "affected", "version": "9.18.4.8" }, { "status": "affected", "version": "9.18.4.22" }, { "status": "affected", "version": "9.18.4.24" }, { "status": "affected", "version": "9.18.4.29" }, { "status": "affected", "version": "9.18.4.34" }, { "status": "affected", "version": "9.18.4.40" }, { "status": "affected", "version": "9.18.4.47" }, { "status": "affected", "version": "9.18.4.50" }, { "status": "affected", "version": "9.18.4.52" }, { "status": "affected", "version": "9.18.4.53" }, { "status": "affected", "version": "9.19.1" }, { "status": "affected", "version": "9.19.1.5" }, { "status": "affected", "version": "9.19.1.9" }, { "status": "affected", "version": "9.19.1.12" }, { "status": "affected", "version": "9.19.1.18" }, { "status": "affected", "version": "9.19.1.22" }, { "status": "affected", "version": "9.19.1.24" }, { "status": "affected", "version": "9.19.1.27" }, { "status": "affected", "version": "9.19.1.28" }, { "status": "affected", "version": "9.19.1.31" }, { "status": "affected", "version": "9.19.1.37" }, { "status": "affected", "version": "9.19.1.38" }, { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" }, { "status": "affected", "version": "9.20.3.9" }, { "status": "affected", "version": "9.20.3.10" }, { "status": "affected", "version": "9.20.3.13" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.22.1.3" }, { "status": "affected", "version": "9.22.1.2" }, { "status": "affected", "version": "9.22.1.6" }, { "status": "affected", "version": "9.23.1" } ] }, { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.2.9" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:41:06.145Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy" } ], "source": { "advisory": "cisco-sa-asa-ftd-ios-dos-DOESHWHy", "defects": [ "CSCwo49928", "CSCwo15026" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20224", "datePublished": "2025-08-14T16:28:48.673Z", "dateReserved": "2024-10-10T19:15:13.235Z", "dateUpdated": "2025-08-14T19:20:44.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20265 (GCVE-0-2025-20265)
Vulnerability from cvelistv5
Published
2025-08-14 16:30
Modified
2025-08-16 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary
A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.
This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level.
Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 7.0.7 Version: 7.7.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20265", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-16T03:55:50.492Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-08-16T00:52:15.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/" }, { "url": "https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Management Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.0.7" }, { "status": "affected", "version": "7.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.\u0026nbsp;\r\n\r\nThis vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high\u0026nbsp;privilege level.\r\nNote: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:30:03.286Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fmc-radius-rce-TNBKf79", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79" } ], "source": { "advisory": "cisco-sa-fmc-radius-rce-TNBKf79", "defects": [ "CSCwo91250" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Management Center Software Radius Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20265", "datePublished": "2025-08-14T16:30:03.286Z", "dateReserved": "2024-10-10T19:15:13.244Z", "dateUpdated": "2025-08-16T03:55:50.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20302 (GCVE-0-2025-20302)
Vulnerability from cvelistv5
Published
2025-08-14 16:31
Modified
2025-08-14 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, low-privileged, remote attacker to retrieve a generated report from a different domain.
This vulnerability is due to missing authorization checks. An attacker could exploit this vulnerability by directly accessing a generated report file for a different domain that is managed on the same Cisco Secure FMC instance. A successful exploit could allow the attacker to access a previously run report for a different domain, which could allow an attacker to read activity recorded in that domain.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Firepower Management Center |
Version: 6.2.3.12 Version: 6.2.3.1 Version: 6.2.3.10 Version: 6.2.3.8 Version: 6.4.0.6 Version: 6.2.3 Version: 6.4.0.7 Version: 6.2.3.13 Version: 6.2.3.5 Version: 6.4.0.4 Version: 6.2.3.9 Version: 6.2.3.14 Version: 6.4.0.1 Version: 6.2.3.6 Version: 6.2.3.11 Version: 6.4.0.8 Version: 6.2.3.2 Version: 6.4.0.2 Version: 6.2.3.3 Version: 6.4.0.3 Version: 6.2.3.7 Version: 6.2.3.4 Version: 6.4.0.5 Version: 6.4.0 Version: 6.2.3.15 Version: 6.6.0 Version: 6.4.0.9 Version: 6.2.3.16 Version: 6.6.0.1 Version: 6.6.1 Version: 6.4.0.10 Version: 6.4.0.11 Version: 6.6.3 Version: 6.6.4 Version: 6.4.0.12 Version: 7.0.0 Version: 6.2.3.17 Version: 7.0.0.1 Version: 6.6.5 Version: 7.0.1 Version: 7.1.0 Version: 6.6.5.1 Version: 6.4.0.13 Version: 7.0.1.1 Version: 6.2.3.18 Version: 6.4.0.14 Version: 6.6.5.2 Version: 7.1.0.1 Version: 7.0.2 Version: 6.4.0.15 Version: 7.2.0 Version: 7.0.2.1 Version: 7.0.3 Version: 6.6.7 Version: 7.1.0.2 Version: 7.2.0.1 Version: 7.0.4 Version: 7.2.1 Version: 7.0.5 Version: 6.4.0.16 Version: 7.3.0 Version: 7.2.2 Version: 6.6.7.1 Version: 7.3.1 Version: 7.2.3 Version: 7.1.0.3 Version: 7.2.3.1 Version: 7.2.4 Version: 7.0.6 Version: 7.2.4.1 Version: 7.2.5 Version: 7.3.1.1 Version: 7.4.0 Version: 6.4.0.17 Version: 7.0.6.1 Version: 7.2.5.1 Version: 7.4.1 Version: 7.2.6 Version: 7.4.1.1 Version: 7.0.6.2 Version: 6.4.0.18 Version: 6.6.7.2 Version: 7.2.7 Version: 7.2.5.2 Version: 7.3.1.2 Version: 7.2.8 Version: 7.6.0 Version: 7.4.2 Version: 7.2.8.1 Version: 7.0.6.3 Version: 7.4.2.1 Version: 7.2.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20302", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:36:53.594490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:18:41.070Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Firepower Management Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" }, { "status": "affected", "version": "6.6.5.1" }, { "status": "affected", "version": "6.4.0.13" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.4.0.14" }, { "status": "affected", "version": "6.6.5.2" }, { "status": "affected", "version": "7.1.0.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "6.4.0.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.0.2.1" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "7.1.0.2" }, { "status": "affected", "version": "7.2.0.1" }, { "status": "affected", "version": "7.0.4" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.4.0.16" }, { "status": "affected", "version": "7.3.0" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "6.6.7.1" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.1.0.3" }, { "status": "affected", "version": "7.2.3.1" }, { "status": "affected", "version": "7.2.4" }, { "status": "affected", "version": "7.0.6" }, { "status": "affected", "version": "7.2.4.1" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "7.3.1.1" }, { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "6.4.0.17" }, { "status": "affected", "version": "7.0.6.1" }, { "status": "affected", "version": "7.2.5.1" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.6" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.0.6.2" }, { "status": "affected", "version": "6.4.0.18" }, { "status": "affected", "version": "6.6.7.2" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.2.5.2" }, { "status": "affected", "version": "7.3.1.2" }, { "status": "affected", "version": "7.2.8" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.2.8.1" }, { "status": "affected", "version": "7.0.6.3" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.2.9" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, low-privileged, remote attacker to retrieve a generated report from a different domain.\r\n\r\nThis vulnerability is due to missing authorization checks. An attacker could exploit this vulnerability by directly accessing a generated report file for a different domain that is managed on the same Cisco Secure FMC instance. A successful exploit could allow the attacker to access a previously run report for a different domain, which could allow an attacker to read activity recorded in that domain." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "Missing Authorization", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:31:15.167Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-fmc-authz-bypass-M7xhnAu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-authz-bypass-M7xhnAu" } ], "source": { "advisory": "cisco-sa-fmc-authz-bypass-M7xhnAu", "defects": [ "CSCwn18587" ], "discovery": "INTERNAL" }, "title": "Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20302", "datePublished": "2025-08-14T16:31:15.167Z", "dateReserved": "2024-10-10T19:15:13.252Z", "dateUpdated": "2025-08-14T19:18:41.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…