CVE-2025-20363
Cisco Adaptive Security Appliance (ASA) Análise e mitigação de vulnerabilidades

Visão geral

A critical vulnerability (CVE-2025-20363) was discovered in the web services of multiple Cisco products including Secure Firewall Adaptive Security Appliance (ASA) Software, Secure Firewall Threat Defense (FTD) Software, IOS Software, IOS XE Software, and IOS XR Software. The vulnerability was disclosed on September 25, 2025, and received a CVSS base score of 9.0. This security flaw affects various Cisco products when specific configurations are enabled, such as Remote Access SSL VPN or HTTP server features (Cisco Advisory).

Detalhes técnicos

The vulnerability (CVE-2025-20363) is classified as a heap-based buffer overflow (CWE-122) that stems from improper validation of user-supplied input in HTTP requests. The vulnerability has a Critical Security Impact Rating with a CVSS Base Score of 9.0 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). For Cisco ASA and FTD Software, the vulnerability can be exploited by an unauthenticated, remote attacker, while for Cisco IOS, IOS XE, and IOS XR Software, exploitation requires an authenticated remote attacker with low user privileges (Cisco Advisory, NVD).

Impacto

A successful exploitation of this vulnerability could allow an attacker to execute arbitrary code as root on the affected device, potentially leading to complete compromise of the system. The impact varies depending on the affected product, with the most severe scenario allowing unauthenticated remote code execution with root privileges (Cisco Advisory).

Mitigação e soluções alternativas

Cisco has released software updates that address this vulnerability and strongly recommends that customers upgrade to a fixed software release. There are no workarounds available that address this vulnerability. For Cisco ASA Software, fixed versions include 9.16.4.84, 9.18.4.57, 9.19.1.42, 9.20.3.16, 9.22.2, and 9.23.1.3. For Cisco FTD Software, fixed versions include 7.0.8, 7.2.10, 7.4.2.3, 7.6.1, and 7.7.10 (Cisco Advisory).

Recursos adicionais


OrigemEste relatório foi gerado usando IA

Relacionado Cisco Adaptive Security Appliance (ASA) Vulnerabilidades:

CVE ID

Gravidade

Pontuação

Tecnologias

Nome do componente

Exploração do CISA KEV

Tem correção

Data de publicação

CVE-2025-20333CRITICAL9.9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
SimSimSep 25, 2025
CVE-2025-20363CRITICAL9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NãoSimSep 25, 2025
CVE-2025-20263HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NãoSimAug 14, 2025
CVE-2025-20362MEDIUM6.5
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
SimSimSep 25, 2025
CVE-2025-20254MEDIUM5.8
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NãoSimAug 14, 2025

Avaliação de vulnerabilidade gratuita

Compare sua postura de segurança na nuvem

Avalie suas práticas de segurança na nuvem em 9 domínios de segurança para comparar seu nível de risco e identificar lacunas em suas defesas.

Solicitar avaliação

Marque uma demonstração personalizada

Pronto para ver a Wiz em ação?

"A melhor experiência do usuário que eu já vi, fornece visibilidade total para cargas de trabalho na nuvem."
David EstlickCISO
"A Wiz fornece um único painel de vidro para ver o que está acontecendo em nossos ambientes de nuvem."
Adão FletcherDiretor de Segurança
"Sabemos que se a Wiz identifica algo como crítico, na verdade é."
Greg PoniatowskiChefe de Gerenciamento de Ameaças e Vulnerabilidades