CVE-2025-20362
Analyzed
Published: 25 Sept 2025, 16:15
Last modified:26 Sept 2025, 19:26
Vulnerability Summary
Overall Risk
High Risk
57/100 CVSS Score
6.5 MEDIUM
v3.1
EPSS Score
7.37% MEDIUM
91%ile 0.00%
CISA KEV
Active
Ransomware
Known Use
Exploits
None found
Dark Web
Not detected
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication.
This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.
Source Identifier: psirt@cisco.com
CVSS | Source | Severity | Exploitability | Impact | Vector |
---|---|---|---|---|---|
v4.0 | n/a | ||||
v3.1 | psirt@cisco.com | 6.5 MEDIUM | 3.9 | 2.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L... |
v3.0 | n/a | ||||
v2.0 | n/a |
7.37%
Current Score
0.00%
91%ile
Percentile Rank
0.00%
Loading chart...
Loading chart...
Missing Authorization CWE-862
Description:The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Vulnerability Name:Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability
Added to CISA Catalog:25 Sept 2025, 00:00
Action Due:26 Sept 2025, 00:00
Known Ransomware: Ransomware
Required Action:The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor’s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
No dark web activity detected for this vulnerability.
No known public exploit code indexed (as of 26 Sept 2025, 19:26).
Exploitation status can change quickly once PoC code appears.
Affected Configurations (CPE)
cisco adaptive_security_appliance_softwareVulnerable
Version: *
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cisco adaptive_security_appliance_softwareVulnerable
Version: *
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cisco adaptive_security_appliance_softwareVulnerable
Version: *
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cisco adaptive_security_appliance_softwareVulnerable
Version: *
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cisco adaptive_security_appliance_softwareVulnerable
Version: *
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cisco adaptive_security_appliance_softwareVulnerable
Version: *
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cisco adaptive_security_appliance_softwareVulnerable
Version: *
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cisco firepower_threat_defenseVulnerable
Version: *
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cisco firepower_threat_defenseVulnerable
Version: *
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cisco firepower_threat_defenseVulnerable
Version: *
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cisco firepower_threat_defenseVulnerable
Version: *
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cisco firepower_threat_defenseVulnerable
Version: *
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
URL | Tags | Source |
---|---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW | vendor advisory | psirt@cisco.com |
https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks | vendor advisory | 134c704f-9b21-4f2e-91b3-4a467353bcc0 |