- Description
- A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper parsing of SSL/TLS certificates. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static Network Address Translation (NAT) rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
- Source
- psirt@cisco.com
- NVD status
- Deferred
CVSS 3.1
- Type
- Secondary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
- psirt@cisco.com
- CWE-415
- Hype score
- Not currently trending
CVE-2025-20134 A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Softw… https://t.co/bAyIlXTzXF
@CVEnew
15 Aug 2025
202 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-20134: HIGH] Critical vulnerability in Cisco Secure Firewall ASA and FTD Software allows remote attackers to trigger device reload via malicious SSL/TLS certificate, leading to DoS.#cve,CVE-2025-20134,#cybersecurity https://t.co/KPFPxajPXY https://t.co/aQ0htnA7Ql
@CveFindCom
14 Aug 2025
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes