CVE-2025-20244

HIGH

Cisco Secure Firewall - DoS

Title source: llm
STIX 2.1

Description

A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow a remote attacker that is authenticated as a VPN user to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header field value. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted Remote Access SSL VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition, which would cause the affected device to reload.

Scores

CVSS v3 7.7
EPSS 0.0012
EPSS Percentile 30.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-1287
Status published
Products (50)
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.1
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.1.2
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.1.3
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2.1
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2.4
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2.5
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.2.9
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.3
Cisco/Cisco Adaptive Security Appliance (ASA) Software 9.12.3.12
... and 40 more
Published Aug 14, 2025
Tracked Since Feb 18, 2026