CVE-2025-20333
Cisco Adaptive Security Appliance (ASA) Analyse et atténuation des vulnérabilités

Aperçu

A critical vulnerability (CVE-2025-20333) was discovered in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The vulnerability was disclosed on September 25, 2025, and received a CVSS base score of 9.9. This buffer overflow vulnerability affects multiple versions of Cisco ASA (9.12.x through 9.22.x) and Cisco FTD (7.0.x through 7.6.x) software (Cisco Advisory).

Détails techniques

The vulnerability (CVE-2025-20333) is classified as a buffer overflow (CWE-120) that stems from improper validation of user-supplied input in HTTP(S) requests. The vulnerability requires valid VPN user credentials for exploitation, however, it can be chained with CVE-2025-20362 to achieve unauthenticated access. The vulnerability received a Critical severity rating with a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) (Rapid7, NVD).

Impact

A successful exploitation of this vulnerability allows an attacker to execute arbitrary code as root on the affected device, potentially resulting in complete compromise of the system. The impact is particularly severe as it affects critical security infrastructure devices and has been actively exploited in the wild (Cisco Event Response).

Atténuation et solutions de contournement

Cisco has released software updates to address this vulnerability and strongly recommends immediate upgrade to the fixed versions. For ASA Software, fixed versions include 9.16.4.85, 9.18.4.47, 9.20.3.7, and 9.22.1.3. For FTD Software, fixed versions include 7.0.8.1, 7.2.9, 7.4.2.4, and 7.6.1. No workarounds are available. In cases of suspected compromise, Cisco recommends resetting devices to factory defaults after upgrading and reconfiguring with new passwords and certificates (Cisco Event Response).

Réactions de la communauté

The vulnerability has prompted immediate response from multiple government agencies. CISA issued Emergency Directive ED 25-03 requiring federal agencies to identify, analyze, and mitigate potential compromises immediately. The Australian Signals Directorate, Canadian Centre for Cyber Security, UK National Cyber Security Centre, and US CISA have all been involved in supporting the investigation of this vulnerability (CISA Alert, Cisco Advisory).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté Cisco Adaptive Security Appliance (ASA) Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2025-20333CRITICAL9.9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
OuiOuiSep 25, 2025
CVE-2025-20363CRITICAL9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
NonOuiSep 25, 2025
CVE-2025-20263HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NonOuiAug 14, 2025
CVE-2025-20362MEDIUM6.5
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
OuiOuiSep 25, 2025
CVE-2025-20254MEDIUM5.8
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NonOuiAug 14, 2025

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités