PT-2025-33327 · Cisco · Cisco Ios Xe +3
Jason Crowder
·
Published
2025-08-14
·
Updated
2025-09-02
·
CVE-2025-20239
8.6
High
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions:
Cisco IOS Software (affected versions not specified)
Cisco IOS XE Software (affected versions not specified)
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software (affected versions not specified)
Cisco Secure Firewall Threat Defense (FTD) Software (affected versions not specified)
Description:
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition. This issue is due to a lack of proper processing of IKEv2 packets. An attacker could exploit this by sending crafted IKEv2 packets to an affected device. In the case of Cisco IOS and IOS XE Software, a successful exploit could cause the device to reload unexpectedly. In the case of Cisco ASA and FTD Software, a successful exploit could allow the attacker to partially exhaust system memory, causing system instability such as being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
DoS
Memory Leak
Weakness Enumeration
Related Identifiers
Affected Products
References · 7
- https://bdu.fstec.ru/vul/2025-10354 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy · Vendor Advisory
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy#fs · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-20239 · Security Note
- https://twitter.com/CveFindCom/status/1956041088017248696 · Twitter Post
- https://t.me/true_secator/7332 · Telegram Post
- https://twitter.com/VulmonFeeds/status/1956161437685956619 · Twitter Post