CVE-2025-20244
BaseFortify
Publication date: 2025-08-14
Last updated on: 2025-08-15
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | secure_firewall_ftd_software | * |
| cisco | secure_firewall_asa_software | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1287 | The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Remote Access SSL VPN service of Cisco Secure Firewall ASA and FTD software. It occurs because of incomplete error checking when parsing an HTTP header field value. An authenticated remote VPN user can exploit this by sending a specially crafted HTTP request, causing the device to reload unexpectedly and resulting in a denial of service (DoS) condition.
How can this vulnerability impact me? :
If exploited, this vulnerability can cause the affected Cisco firewall device to reload unexpectedly, leading to a denial of service (DoS). This means that legitimate users could lose access to the VPN service and potentially other network resources protected by the device until it recovers.