CVE-2025-20362: Missing Authorization in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory. A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.
AI Analysis
Technical Summary
CVE-2025-20362 is a missing authorization vulnerability in the VPN web server component of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The flaw arises from improper validation of user-supplied input in HTTP(S) requests, allowing an unauthenticated remote attacker to bypass authentication and access restricted URL endpoints related to remote access VPN functionality. This unauthorized access could expose sensitive VPN configuration or status information, potentially aiding further exploitation or reconnaissance. In November 2025, Cisco identified a new attack variant that exploits this and a related vulnerability (CVE-2025-20333) to cause unpatched devices to reload unexpectedly, leading to denial of service conditions. The vulnerability affects numerous ASA software versions spanning from 9.8.1 through 9.23.1.13, indicating a broad impact across many Cisco deployments. The vulnerability requires no privileges or user interaction, making it relatively easy to exploit remotely over the network. Cisco has released fixed software versions and strongly urges customers to upgrade to mitigate the risk. No known exploits are reported in the wild yet, but the potential for unauthorized access and DoS makes this a significant concern for organizations relying on Cisco ASA and FTD devices for VPN and firewall services.
Potential Impact
The vulnerability allows unauthenticated attackers to bypass authorization controls on Cisco Secure Firewall ASA and FTD VPN web servers, potentially exposing sensitive VPN-related URLs and information. This unauthorized access could facilitate further attacks, such as reconnaissance, credential harvesting, or exploitation of other vulnerabilities. The newly discovered attack variant causing device reloads can lead to denial of service, disrupting network security and remote access capabilities. Organizations relying on these Cisco devices for VPN access and firewall protection may experience confidentiality breaches and service interruptions. Given the widespread use of Cisco ASA and FTD products globally, the impact could be significant, affecting enterprise networks, government agencies, and critical infrastructure providers. The medium CVSS score reflects moderate risk, but the ease of exploitation without authentication and the broad affected version range increase the urgency for remediation. Failure to patch could result in unauthorized access to sensitive network segments and potential operational downtime.
Mitigation Recommendations
1. Immediately upgrade Cisco Secure Firewall ASA and FTD devices to the fixed software versions provided by Cisco to address CVE-2025-20362 and related vulnerabilities. 2. Apply defense-in-depth measures such as restricting management interface access to trusted IP addresses and networks to reduce exposure of the VPN web server. 3. Monitor network traffic for unusual HTTP(S) requests targeting VPN web server endpoints that could indicate exploitation attempts. 4. Implement strict network segmentation to limit the impact of any unauthorized access gained through this vulnerability. 5. Regularly audit and review VPN configurations and access logs to detect anomalies. 6. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect attempts to exploit this vulnerability. 7. Maintain an up-to-date asset inventory to ensure all affected devices are identified and patched promptly. 8. Consider temporary disabling or restricting VPN web server access if immediate patching is not feasible, balancing operational needs and security risks.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Singapore, United Arab Emirates, Israel, Italy
CVE-2025-20362: Missing Authorization in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
Description
Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory. A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20362 is a missing authorization vulnerability in the VPN web server component of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The flaw arises from improper validation of user-supplied input in HTTP(S) requests, allowing an unauthenticated remote attacker to bypass authentication and access restricted URL endpoints related to remote access VPN functionality. This unauthorized access could expose sensitive VPN configuration or status information, potentially aiding further exploitation or reconnaissance. In November 2025, Cisco identified a new attack variant that exploits this and a related vulnerability (CVE-2025-20333) to cause unpatched devices to reload unexpectedly, leading to denial of service conditions. The vulnerability affects numerous ASA software versions spanning from 9.8.1 through 9.23.1.13, indicating a broad impact across many Cisco deployments. The vulnerability requires no privileges or user interaction, making it relatively easy to exploit remotely over the network. Cisco has released fixed software versions and strongly urges customers to upgrade to mitigate the risk. No known exploits are reported in the wild yet, but the potential for unauthorized access and DoS makes this a significant concern for organizations relying on Cisco ASA and FTD devices for VPN and firewall services.
Potential Impact
The vulnerability allows unauthenticated attackers to bypass authorization controls on Cisco Secure Firewall ASA and FTD VPN web servers, potentially exposing sensitive VPN-related URLs and information. This unauthorized access could facilitate further attacks, such as reconnaissance, credential harvesting, or exploitation of other vulnerabilities. The newly discovered attack variant causing device reloads can lead to denial of service, disrupting network security and remote access capabilities. Organizations relying on these Cisco devices for VPN access and firewall protection may experience confidentiality breaches and service interruptions. Given the widespread use of Cisco ASA and FTD products globally, the impact could be significant, affecting enterprise networks, government agencies, and critical infrastructure providers. The medium CVSS score reflects moderate risk, but the ease of exploitation without authentication and the broad affected version range increase the urgency for remediation. Failure to patch could result in unauthorized access to sensitive network segments and potential operational downtime.
Mitigation Recommendations
1. Immediately upgrade Cisco Secure Firewall ASA and FTD devices to the fixed software versions provided by Cisco to address CVE-2025-20362 and related vulnerabilities. 2. Apply defense-in-depth measures such as restricting management interface access to trusted IP addresses and networks to reduce exposure of the VPN web server. 3. Monitor network traffic for unusual HTTP(S) requests targeting VPN web server endpoints that could indicate exploitation attempts. 4. Implement strict network segmentation to limit the impact of any unauthorized access gained through this vulnerability. 5. Regularly audit and review VPN configurations and access logs to detect anomalies. 6. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect attempts to exploit this vulnerability. 7. Maintain an up-to-date asset inventory to ensure all affected devices are identified and patched promptly. 8. Consider temporary disabling or restricting VPN web server access if immediate patching is not feasible, balancing operational needs and security risks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisco
- Date Reserved
- 2024-10-10T19:15:13.258Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d56a80611617954beac292
Added to database: 9/25/2025, 4:14:56 PM
Last enriched: 2/27/2026, 12:26:01 AM
Last updated: 3/24/2026, 9:09:56 PM
Views: 522
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.