CVE-2025-20362
BaseFortify
Publication date: 2025-09-25
Last updated on: 2025-11-06
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | adaptive_security_appliance_software | From 9.12 (inc) to 9.12.4.72 (exc) |
| cisco | adaptive_security_appliance_software | From 9.14 (inc) to 9.14.4.28 (exc) |
| cisco | adaptive_security_appliance_software | From 9.16 (inc) to 9.16.4.85 (exc) |
| cisco | adaptive_security_appliance_software | From 9.17.0 (inc) to 9.18.4.67 (exc) |
| cisco | adaptive_security_appliance_software | From 9.19 (inc) to 9.20.4.10 (exc) |
| cisco | adaptive_security_appliance_software | From 9.22 (inc) to 9.22.2.14 (exc) |
| cisco | adaptive_security_appliance_software | From 9.23 (inc) to 9.23.1.19 (exc) |
| cisco | firepower_threat_defense | From 7.0.0 (inc) to 7.0.8.1 (exc) |
| cisco | firepower_threat_defense | From 7.1.0 (inc) to 7.2.10.2 (exc) |
| cisco | firepower_threat_defense | From 7.3.0 (inc) to 7.4.2.4 (exc) |
| cisco | firepower_threat_defense | From 7.6.0 (inc) to 7.6.2.1 (exc) |
| cisco | firepower_threat_defense | From 7.7.0 (inc) to 7.7.10.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the VPN web server of Cisco Secure Firewall ASA and FTD Software. It allows an unauthenticated remote attacker to bypass authentication and access restricted URL endpoints by sending specially crafted HTTP(S) requests. The root cause is improper validation of user-supplied input in these requests.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability could gain unauthorized access to restricted areas of the VPN web server without needing to authenticate. This could lead to exposure of sensitive information or unauthorized actions within the affected system, potentially compromising confidentiality and integrity.