
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2025-20268) was discovered in the Geolocation-Based Remote Access (RA) VPN feature of Cisco Secure Firewall Threat Defense (FTD) Software. The vulnerability was disclosed on August 14, 2025, affecting Cisco Secure FTD Software Release 7.7.0 with Geolocation-Based RA VPN enabled. This security flaw could allow an unauthenticated, remote attacker to bypass configured policies that control HTTP connections based on geographical locations (Cisco Advisory, NVD).
The vulnerability stems from incomplete parsing of URL strings in the Geolocation-Based RA VPN feature. It has been assigned CWE-229 (Improper Handling of Values) and received a CVSS v3.1 Base Score of 5.8 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N, indicating network accessibility, low attack complexity, and no required privileges or user interaction (Cisco Advisory, NVD).
A successful exploitation of this vulnerability could enable attackers to bypass configured geolocation-based policies and gain unauthorized access to networks where connections should have been denied based on country or region restrictions (Cisco Advisory).
Cisco has released software updates to address this vulnerability. No workarounds are available for this security issue. Organizations using affected devices running Cisco Secure FTD Software Release 7.7.0 with Geolocation-Based RA VPN enabled should upgrade to a fixed version as recommended by Cisco (Cisco Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."