CVE-2025-20133
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-14

Last updated on: 2025-08-15

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the management and VPN web servers of the Remote Access SSL VPN feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly stop responding, resulting in a DoS condition. This vulnerability is due to ineffective validation of user-supplied input during the Remote Access SSL VPN authentication process. An attacker could exploit this vulnerability by sending a crafted request to the VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition where the device stops responding to Remote Access SSL VPN authentication requests.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-14
Last Modified
2025-08-15
Generated
2026-05-06
AI Q&A
2025-08-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
cisco secure_ftd *
cisco secure_firewall_asa 3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-401 The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the management and VPN web servers of the Remote Access SSL VPN feature in Cisco Secure Firewall ASA Software and Secure FTD Software. It is caused by ineffective validation of user-supplied input during the VPN authentication process. An unauthenticated, remote attacker can exploit this by sending a specially crafted request to the VPN service, which can cause the device to stop responding unexpectedly, leading to a denial-of-service (DoS) condition.


How can this vulnerability impact me? :

If exploited, this vulnerability can cause the affected device to stop responding to Remote Access SSL VPN authentication requests, resulting in a denial-of-service (DoS) condition. This means legitimate users may be unable to access the VPN service, disrupting remote access and potentially impacting business operations that rely on secure remote connectivity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart