AI description
CVE-2025-20363 is a vulnerability that affects Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software. It could allow an unauthenticated, remote attacker (for Cisco ASA and FTD Software) or an authenticated, remote attacker with low user privileges (for Cisco IOS, IOS XE, and IOS XR Software) to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web service, potentially leading to the execution of arbitrary code as root and complete compromise of the device.
- Description
- A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker (Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web service on an affected device after obtaining additional information about the system, overcoming exploit mitigations, or both. A successful exploit could allow the attacker to execute arbitrary code as root, which may lead to the complete compromise of the affected device. For more information about this vulnerability, see the Details ["#details"] section of this advisory.
- Source
- psirt@cisco.com
- NVD status
- Analyzed
- Products
- adaptive_security_appliance_software, firepower_threat_defense
CVSS 3.1
- Type
- Primary
- Base score
- 9
- Impact score
- 6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- psirt@cisco.com
- CWE-122
- Hype score
- Not currently trending
CVE-2025-20333 CVE-2025-20362 CVE-2025-20363 could be under active exploitation. Patch immediately. Cloudflare is actively monitoring and researching the CVEs, but in the meantime we deployed 2 aggressive rules (default off) for who wants to block access all together.
@Cloudforce_One
28 Sept 2025
848 Impressions
1 Retweet
14 Likes
1 Bookmark
1 Reply
1 Quote
تحذير أمني عاجل: كشفت Cisco عن محاولات استغلال تستهدف أجهزة ASA 5500-X وأصدرت 3 ثغرات جديدة: CVE-2025-20333 CVE-2025-20362 CVE-2025-20363 #Cisco #CyberSecurity https://t.co/qShJ8Al5cm
@Mshoraty
28 Sept 2025
197 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-20333/CVE-2025-20363対応で 9.16.(2) → 9.16(4) にするとHAの挙動が変わっているような気がするな(;´Д`) ちゃんと検証しないとちょっと分からないな(;´Д`)
@XenCenter
27 Sept 2025
76 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Cisco CVEs under Active Exploitation For Executives & Admins – beyond Patch & Pray. 🔥 CVE-2025-20333 → RCE via WebVPN ⚡ CVE-2025-20362 → Privilege Escalation 🕵️ CVE-2025-20363 → HTTP Code Execution ➡️ Combined with RayInitiator Bootk
@stefanab77
26 Sept 2025
100 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
📄 Read the full paper on Zenodo (free): 👉 https://t.co/2MyNVdEOSn 🚨 Critical Cisco CVEs under Active Exploitation 🚨 For Executives & Admins – beyond Patch & Pray. 🔥 CVE-2025-20333 → RCE via WebVPN ⚡ CVE-2025-20362 → Privilege Escalation 🕵️ C
@stefanab77
26 Sept 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Insights: Active Exploitation of Cisco ASA Zero Days https://t.co/Sng2ncKtHZ CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363 affect multiple Cisco products, and are being exploited by a threat actor linked to the ArcaneDoor campaign. The post Threat Insights: Active
@f1tym1
26 Sept 2025
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Three vulnerabilities (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363) affecting Cisco ASA and FTD software are under active exploitation. We discuss the lifecycle of zero-day vulnerabilities and the phenomenon of “patch-or-perish.” https://t.co/zTcQCf8hFP https://t.co/sPFvB
@Unit42_Intel
26 Sept 2025
9131 Impressions
49 Retweets
121 Likes
34 Bookmarks
1 Reply
1 Quote
Cisco, ASA / FTD / IOS ürünlerinde kritik güvenlik açıklarını duyurdu. Yeni yayınlanan CVE-2025-20333, CVE-2025-20362 ve CVE-2025-20363 açıklıklarından ikisi aktif olarak istismar ediliyor. 🔴 Sistemlerinizi derhal güncelleyin ve yamaları uygulayın. https://t.co/
@KamCyberTR
26 Sept 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Upozorňujeme na sérii kritických zranitelností v Cisco Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD) a Cisco IOS, CVE-2025-20333, CVE-2025-20363 a CVE-2025-20362. Zneužití těchto zranitelností může umožnit vzdálenému neautentizovanému útočn
@GOVCERT_CZ
26 Sept 2025
793 Impressions
3 Retweets
3 Likes
0 Bookmarks
0 Replies
1 Quote
シスコ社が重大(Critical)な遠隔コード実行の脆弱性を修正。CVE-2025-20363はファイアウォール製品では認証不要でCVSSスコア9.0、IOS系製品では要認証でCVSSスコア8.5。Secure Firewall ASA, Secure Firewall Threat Defense (FTD), IOS, I
@__kokumoto
26 Sept 2025
1888 Impressions
7 Retweets
16 Likes
6 Bookmarks
0 Replies
0 Quotes
🟥 CVE-2025-20363, CVSS: 9.0 (#Critical) Cisco Secure Firewall ASA, FTD, XE, and XR. The vulnerability allows remote code execution (as root) due to improper validation of user-supplied input in HTTP requests. Unauthenticated attackers can exploit Cisco ASA and FTD Software,
@UjlakiMarci
25 Sept 2025
5120 Impressions
3 Retweets
11 Likes
10 Bookmarks
1 Reply
1 Quote
Cisco ASA & FTD RCE Vulnerability: CVE-2025-20363 A heap buffer overflow in Cisco ASA and FTD (CVE-2025-20363) enables unauthenticated RCE. Patch ASAP to block attackers. For more details, read ZeroPath's blog on this vuln. #AppSec #InfoSec #Cisco https://t.co/wGb4CtmjdS
@ZeroPathLabs
25 Sept 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20363 A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IO… https://t.co/yikZYD7Bn4
@CVEnew
25 Sept 2025
211 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "775B3D5F-25D3-4B1C-9BA2-985263A6CE83",
"versionEndExcluding": "9.12.4.72",
"versionStartIncluding": "9.12"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9AD381CE-3B2E-4633-AA43-7A82BA7D39CF",
"versionEndExcluding": "9.14.4.28",
"versionStartIncluding": "9.14"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E2686697-B6D5-4F75-9BAF-0B070C07EECB",
"versionEndExcluding": "9.16.4.84",
"versionStartIncluding": "9.16"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9B434E47-6F45-4E2A-9147-196B33B75F9F",
"versionEndExcluding": "9.18.4.57",
"versionStartIncluding": "9.17.0"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0E1E5F3D-776C-48CE-B09F-F865ECCE1E86",
"versionEndExcluding": "9.19.1.42",
"versionStartIncluding": "9.19"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "37602BC1-1F58-4742-95AF-2E70EECA9986",
"versionEndExcluding": "9.20.3.16",
"versionStartIncluding": "9.20"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "156946A8-18CE-49C7-969C-D2E1C201EEE9",
"versionEndExcluding": "9.22.2",
"versionStartIncluding": "9.22"
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9A5616E7-4866-4229-97A6-C91DD029CA1F",
"versionEndExcluding": "9.23.1.3",
"versionStartIncluding": "9.23"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "09A83737-0EE2-4D5D-915B-3133F3A81FB5",
"versionEndExcluding": "7.0.8",
"versionStartIncluding": "7.0.0"
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BD175CE1-B297-4445-AAFA-F2201429E6C5",
"versionEndExcluding": "7.2.10",
"versionStartIncluding": "7.1.0"
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D8A1EC36-8C42-4890-918A-0B38027B36F3",
"versionEndExcluding": "7.4.2.3",
"versionStartIncluding": "7.3.0"
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F39B5499-B7CE-4FA5-B882-609859CF1598",
"versionEndExcluding": "7.7.10",
"versionStartIncluding": "7.7.0"
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.6.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "76B73F03-93B6-48C3-BF97-FEAF26895A2D"
}
],
"operator": "OR"
}
]
}
]