CVE-2025-20133

HIGH

Cisco Secure Firewall ASA/FTD - DoS

Title source: llm
STIX 2.1

Description

A vulnerability in the management and VPN web servers of the Remote Access SSL VPN feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly stop responding, resulting in a DoS condition. This vulnerability is due to ineffective validation of user-supplied input during the Remote Access SSL VPN authentication process. An attacker could exploit this vulnerability by sending a crafted request to the VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition where the device stops responding to Remote Access SSL VPN authentication requests.

Scores

CVSS v3 8.6
EPSS 0.0008
EPSS Percentile 23.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-401
Status published
Products (50)
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.1
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.1.2
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.1.3
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2.1
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2.4
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2.5
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2.9
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.3
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.3.12
... and 40 more
Published Aug 14, 2025
Tracked Since Feb 18, 2026