CVE-2025-20333
Cisco Adaptive Security Appliance (ASA) Análisis y mitigación de vulnerabilidades

Vista general

A critical vulnerability (CVE-2025-20333) was discovered in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The vulnerability was disclosed on September 25, 2025, and affects multiple versions of both software products. This buffer overflow vulnerability (CWE-120) allows an authenticated remote attacker to execute arbitrary code on affected devices (Cisco Advisory).

Técnicas

The vulnerability stems from improper validation of user-supplied input in HTTP(S) requests. It has been assigned a Critical CVSS base score of 9.9 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). The vulnerability affects multiple software versions including ASA Software versions 9.16.x through 9.22.x and FTD Software versions 7.0.x through 7.6.x. While the vulnerability requires valid VPN user credentials for exploitation, it can be chained with CVE-2025-20362 to achieve unauthenticated access (Rapid7, NVD).

Impacto

A successful exploitation of this vulnerability allows an attacker to execute arbitrary code as root, potentially resulting in complete compromise of the affected device. The impact is particularly severe as it affects critical network security infrastructure and could lead to full system takeover (Cisco Advisory).

Mitigación y soluciones alternativas

Cisco has released software updates that address this vulnerability and strongly recommends that customers upgrade to a fixed software release. There are no workarounds available. For ASA Software, fixed versions include 9.16.4.85, 9.17.1.45, 9.18.4.47, 9.19.1.37, 9.20.3.7, and 9.22.1.3. For FTD Software, fixed versions include 7.0.8.1, 7.2.9, 7.4.2.4, and 7.6.1 (Cisco Advisory).

Reacciones de la comunidad

The vulnerability has garnered significant attention from government cybersecurity agencies. The US Cybersecurity & Infrastructure Security Agency (CISA), the Australian Signals Directorate Australian Cyber Security Centre, the Canadian Centre for Cyber Security, and the UK National Cyber Security Centre (NCSC) have all been involved in supporting the investigation (Cisco Advisory).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado Cisco Adaptive Security Appliance (ASA) Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-20333CRITICAL9.9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
Sep 25, 2025
CVE-2025-20363CRITICAL9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
NoSep 25, 2025
CVE-2025-20263HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoAug 14, 2025
CVE-2025-20362MEDIUM6.5
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
Sep 25, 2025
CVE-2025-20254MEDIUM5.8
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoAug 14, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades