CVE-2025-20363
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-25

Last updated on: 2026-02-10

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker (Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web service on an affected device after obtaining additional information about the system, overcoming exploit mitigations, or both. A successful exploit could allow the attacker to execute arbitrary code as root, which may lead to the complete compromise of the affected device. For more information about this vulnerability, see the Details ["#details"] section of this advisory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-25
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2025-09-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 28 associated CPEs
Vendor Product Version / Range
cisco ios_xr 6.5.1
cisco ios_xr 6.5.2
cisco ios_xr 6.5.3
cisco ios_xr 6.6.2
cisco ios_xr 6.6.25
cisco ios_xr 6.6.3
cisco ios_xr 6.7.1
cisco ios_xr 6.7.2
cisco ios_xr 6.7.3
cisco ios_xr 6.8.1
cisco ios_xr 6.8.2
cisco ios_xr 6.9.1
cisco ios_xr 6.9.2
cisco adaptive_security_appliance_software From 9.12 (inc) to 9.12.4.72 (exc)
cisco adaptive_security_appliance_software From 9.14 (inc) to 9.14.4.28 (exc)
cisco adaptive_security_appliance_software From 9.16 (inc) to 9.16.4.84 (exc)
cisco adaptive_security_appliance_software From 9.22 (inc) to 9.22.2 (exc)
cisco adaptive_security_appliance_software From 9.23 (inc) to 9.23.1.3 (exc)
cisco adaptive_security_appliance_software From 9.17.1 (inc) to 9.18.4.57 (exc)
cisco adaptive_security_appliance_software From 9.19.1 (inc) to 9.19.1.42 (exc)
cisco adaptive_security_appliance_software From 9.20.1 (inc) to 9.20.3.16 (exc)
cisco ios From 12.2(15)b (inc) to 15.9(3 (inc)
cisco ios_xe From 3.2.0sg (inc) to 17.17.1 (inc)
cisco firepower_threat_defense 7.6.0
cisco firepower_threat_defense From 7.0.0 (inc) to 7.0.8 (exc)
cisco firepower_threat_defense From 7.1.0 (inc) to 7.2.10 (exc)
cisco firepower_threat_defense From 7.3.0 (inc) to 7.4.2.3 (exc)
cisco firepower_threat_defense From 7.7.0 (inc) to 7.7.10 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-122 A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the web services of various Cisco software products, including Cisco Secure Firewall ASA, FTD, IOS, IOS XE, and IOS XR. It is caused by improper validation of user-supplied input in HTTP requests. An attacker can exploit this by sending specially crafted HTTP requests to the targeted device's web service. Depending on the product, the attacker may be unauthenticated or have low privileges. Successful exploitation allows the attacker to execute arbitrary code with root privileges, potentially leading to full device compromise.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to an attacker executing arbitrary code as root on the affected device. This means the attacker could gain complete control over the device, potentially disrupting network security, intercepting or altering data, and causing denial of service or other malicious activities.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart