CVE-2025-20243
BaseFortify
Publication date: 2025-08-14
Last updated on: 2025-08-15
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | secure_firewall_ftd_software | * |
| cisco | secure_firewall_asa_software | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-835 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the management and VPN web servers of Cisco Secure Firewall ASA Software and Secure FTD Software. It is caused by improper validation of user-supplied input on an interface with VPN web services. An unauthenticated, remote attacker can exploit this by sending specially crafted HTTP requests to the targeted web server, which can cause the device to reload unexpectedly, leading to a denial of service (DoS) condition.
How can this vulnerability impact me? :
The impact of this vulnerability is a denial of service (DoS) condition. An attacker can cause the affected device to reload unexpectedly, which disrupts normal operations and availability of the firewall or VPN services, potentially affecting network security and connectivity.