CVE-2025-20263
Cisco Adaptive Security Appliance (ASA) Analyse et atténuation des vulnérabilités

Aperçu

A vulnerability in the web services interface of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software was discovered and disclosed on August 14, 2025. The vulnerability, identified as CVE-2025-20263, affects the web services interface of these systems and could allow an unauthenticated, remote attacker to cause a buffer overflow condition (Cisco Advisory).

Détails techniques

The vulnerability stems from insufficient boundary checks for specific data provided to the web services interface of affected systems. It has been assigned a CVSS base score of 8.6 (High severity) with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X. The vulnerability is tracked under CWE-680 and Cisco Bug ID CSCwn21584 (Cisco Advisory).

Impact

A successful exploitation of this vulnerability could allow an attacker to cause a buffer overflow condition on the affected system, which could result in the system reloading and creating a denial of service (DoS) condition. This impacts the availability of critical security infrastructure, potentially disrupting network operations (Cisco Advisory).

Atténuation et solutions de contournement

Cisco has released software updates that address this vulnerability. There are no workarounds available for this vulnerability. Customers with service contracts can obtain security fixes through their usual update channels. Those without service contracts should contact the Cisco Technical Assistance Center (TAC) for assistance (Cisco Advisory).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté Cisco Adaptive Security Appliance (ASA) Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2025-20333CRITICAL9.9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
OuiOuiSep 25, 2025
CVE-2025-20363CRITICAL9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
NonOuiSep 25, 2025
CVE-2025-20263HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NonOuiAug 14, 2025
CVE-2025-20362MEDIUM6.5
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
OuiOuiSep 25, 2025
CVE-2025-20254MEDIUM5.8
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NonOuiAug 14, 2025

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités