Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20362: Missing Authorization in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2025-20362cvecve-2025-20362
Published: Thu Sep 25 2025 (09/25/2025, 16:12:35 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory. A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:26:01 UTC

Technical Analysis

CVE-2025-20362 is a missing authorization vulnerability in the VPN web server component of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The flaw arises from improper validation of user-supplied input in HTTP(S) requests, allowing an unauthenticated remote attacker to bypass authentication and access restricted URL endpoints related to remote access VPN functionality. This unauthorized access could expose sensitive VPN configuration or status information, potentially aiding further exploitation or reconnaissance. In November 2025, Cisco identified a new attack variant that exploits this and a related vulnerability (CVE-2025-20333) to cause unpatched devices to reload unexpectedly, leading to denial of service conditions. The vulnerability affects numerous ASA software versions spanning from 9.8.1 through 9.23.1.13, indicating a broad impact across many Cisco deployments. The vulnerability requires no privileges or user interaction, making it relatively easy to exploit remotely over the network. Cisco has released fixed software versions and strongly urges customers to upgrade to mitigate the risk. No known exploits are reported in the wild yet, but the potential for unauthorized access and DoS makes this a significant concern for organizations relying on Cisco ASA and FTD devices for VPN and firewall services.

Potential Impact

The vulnerability allows unauthenticated attackers to bypass authorization controls on Cisco Secure Firewall ASA and FTD VPN web servers, potentially exposing sensitive VPN-related URLs and information. This unauthorized access could facilitate further attacks, such as reconnaissance, credential harvesting, or exploitation of other vulnerabilities. The newly discovered attack variant causing device reloads can lead to denial of service, disrupting network security and remote access capabilities. Organizations relying on these Cisco devices for VPN access and firewall protection may experience confidentiality breaches and service interruptions. Given the widespread use of Cisco ASA and FTD products globally, the impact could be significant, affecting enterprise networks, government agencies, and critical infrastructure providers. The medium CVSS score reflects moderate risk, but the ease of exploitation without authentication and the broad affected version range increase the urgency for remediation. Failure to patch could result in unauthorized access to sensitive network segments and potential operational downtime.

Mitigation Recommendations

1. Immediately upgrade Cisco Secure Firewall ASA and FTD devices to the fixed software versions provided by Cisco to address CVE-2025-20362 and related vulnerabilities. 2. Apply defense-in-depth measures such as restricting management interface access to trusted IP addresses and networks to reduce exposure of the VPN web server. 3. Monitor network traffic for unusual HTTP(S) requests targeting VPN web server endpoints that could indicate exploitation attempts. 4. Implement strict network segmentation to limit the impact of any unauthorized access gained through this vulnerability. 5. Regularly audit and review VPN configurations and access logs to detect anomalies. 6. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect attempts to exploit this vulnerability. 7. Maintain an up-to-date asset inventory to ensure all affected devices are identified and patched promptly. 8. Consider temporary disabling or restricting VPN web server access if immediate patching is not feasible, balancing operational needs and security risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.258Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d56a80611617954beac292

Added to database: 9/25/2025, 4:14:56 PM

Last enriched: 2/27/2026, 12:26:01 AM

Last updated: 3/24/2026, 9:09:56 PM

Views: 522

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses