Several vulnerabilities have been discovered in Cisco Security Products, the most serious of which could allow arbitrary execution of code. The details of the vulnerabilities are as follows:
Tactical:: Initial access (TA0001):
Technical:: Operate the public oriented application (T1190):
- Vulnerability in the implementation of the Radius subsystem of Cisco Secure Firewall Management Center (FMC) software could allow a non-authenticated distant attacker to inject arbitrary shell commands executed by the device. (CVE-2025-20265)
Additional vulnerabilities of lower severity include:
- Vulnerability in the inspection functionality of the packages of the SNORT 3 detection engine of the Fire De Fire Defire Defire (FTD) of CISCO SCY FIREWOLD could allow a non -authenticated distant attacker to cause a condition of denial of service (back) on an affected device. (CVE-2025-20217)
- Vulnerability in the Proxy Radius function for the VPN IPSEC functionality of Cisco Security Appliance Cisco SECY FIREWALL (ASA) and Defense software for Cisco Fire Fire (FTD) could allow a non -authenticated and distant attacker to cause a denial of service (back). (CVE-2025-20222)
- Vulnerability in the management interface based on the web of Cisco SCY SECURE FIREWALA Management Center (FMC) could allow an authenticated distant attacker to inject arbitrary HTML content into a document generated by the device. (CVE-2025-20148)
- A vulnerability in the SSL Access VPN service remotely for Cisco Secco Firewall SECURITY APPLIENANCE (ASA) and the Defense software for fire threat (FTD) Cisco SECECO could allow a distant attacker who is authenticated as a VPN user to cause the reload of the unexpected system (BACK). (CVE-2025-20244)
- Several vulnerabilities in the management and VPN web servers for adaptive security software (ASA) Cisco Scy Firewall Adaptive Appliance (ASA) and the Defense software for Cisco Fire Fire Threat (FTD) could allow a non -authenticated distant attacker to cause a condition of response or to recharge in an unexpected manner Service (back). (CVE-2025-20243, CVE-2025-20133)
- Vulnerability in the processing of the Cisco Secco Firewall SECURITY Applicance (ASA) software certificate and defense software for the fire threat (FTD) Cisco SCY FIREWAL Menage could allow a non -authenticated distant attacker to unexpectedly recharge the device, resulting in a condition of service denial (DOS). (CVE-2025-20134)
- A vulnerability in the function that performs the IPV4 and IPV6 network address translating inspection for adaptive security software (ASA) and Cisco Sececo Firewal Menage Defense (FTD) could allow an non -authenticated and remote attacker to cause the aircraft reload. (CVE-2025-20136)
- Vulnerability in the VPN SSL VPN service remote access for Cisco Secco Firewall SECURITY APPLIENANCE (ASA) and Defense Fire Fire Fire (FTD) SECUCECO Secure Fire Firewold could allow an authenticized distant attacker to create or delete arbitrary files on the underlying operating system. If the critical system files are handled, the new VPN SSL sessions at a distance could be refused and the existing sessions could be deleted, causing a service condition (back). An exploited device requires manual restart to recover. (CVE-2025-20251)
- Several vulnerabilities in the Key Exchange Internet functionality version 2 (IKEV2) of Cisco iOS software, Cisco iOS Xe software, Cisco Secco Firewall SECURITY APPLIENCE (ASA) and threatening defense software for Cisco firewall could allow a non-authenticated distance striker to trigger a denial of service (DOS). (CVE-2025-20224, CVE-2025-20225, CVE-2025-20239, CVE-2025-20252, CVE-2025-20253, CVE-2025-20254)
- Vulnerability in the Cisco Secco Firewall SECURITY Applicance (ASA) and CISCO SECURE FIREWAL DEFENE (FTD) software interface could allow a non -authenticated distant attacker to cause a buffer over an affected system. (CVE-2025-20263)
- A vulnerability in the TLS 1.3 implementation for a specific figure for Cisco Secco Firewall SECURITY Applicance (ASA) and defense software for fire threat (FTD) for the Cisco firewall could allow an authenticated distance attacker to consume resources that are associated with the new series of new TLS 1.3 SSL / TLS or VPN. (CVE-2025-20127)
- A vulnerability in the VPN (RA) function based on geolocation (RA) of Cisco Secke Defire Defense Defense Software could allow a non -authenticated distant attacker to bypass configured policies to allow or refuse HTTP connections based on a country or region. (CVE-2025-20268)
- Vulnerability in the management interface based on the web of Cisco SCY SECURE FIREWALA Management Center (FMC) could allow a non -authenticated remote striker to carry out a transversal site script attack (XSS) against an interface user. (CVE-2025-20235)
- Vulnerability in the management interface based on the web of Cisco SECY SECURE FIREWAL Management Center (FMC) could allow an authenticated distant attacker to recover sensitive information from an affected device. (CVE-2025-20218)
- Vulnerability in the CISCO SCY SCY FIREWALA Management Center (FMC) software (FMC) and CISCO SECY FIREWAL DEFENCE (FTD) could allow an authenticated local attacker to execute arbitrary orders on the underlying operating system like Racine. (CVE-2025-20220)
- Vulnerability in the management interface based on the web of the Cisco SECY SECURE FIREWALA Management Center (FMC) software could allow an authenticated distant attacker with privileges at the administrator level to execute arbitrary orders on the underlying operating system. (CVE-2025-20306)
- Several vulnerabilities in the management interface based on the web of Cisco SECY SECURE FIREWAL Management Center (FMC) could allow an authenticated access attacker to files to which they are not allowed to access. (CVE-2025-20301, CVE-2025-20302)
- A vulnerability in the functionality of the DHCP customer of the adaptive security software (ASA) Cisco SECCO SECY FIREWALL Adaptive Security Appliance (Cisco Secco Firewal Menage Defense (FTD) could allow an unauthenticized adjacent attacker to exhaust the available memory. (CVE-2025-20135)
- Several vulnerabilities in Cisco Secco Firewall Adaptive SECURITY Appliance (ASA) and CISCO SECY SECURE FIREWAL Menage Defense (FTD) could allow an authenticated local attacker to execute arbitrary orders on the underlying operating system with root level privileges. To exploit these vulnerabilities, the attacker must have valid administrative identification information. (CVE-2025-20237, CVE-2025-20238)
- A vulnerability in the implementation of access control rules for looping interfaces in Cisco Secco Firewall SECURITY APPLIENANCE (ASA) and Defense Fire Defense Software (FTD) CISCO SEPY FIREWAL MELIERS (FTD) could allow an non -authenticated distant and distant attacker to send a traffic that should have been blocked LOOPBACK. (CVE-2025-20219)
The successful exploitation of the most serious of these vulnerabilities could allow an arbitrary execution of code in the context of the user associated with the service. According to the privileges associated with the account, an attacker could then install programs; Show, modify or delete data; Or create new accounts with complete user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those that operate with administrative user rights.