PT-2025-39421 · Cisco · Cisco Secure Firewall Threat Defense+2
Published
2025-09-25
·
Updated
2026-03-10
·
CVE-2025-20362
CVSS v3.1
8.6
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software (affected versions not specified)
Description
A security issue exists in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. This flaw allows a remote, unauthenticated attacker to bypass authorization checks and gain access to restricted URLs by sending specially crafted HTTP requests. The vulnerability is actively being exploited, with reports indicating attempted exploitation and real-world attacks. Approximately 34,000 devices are estimated to be vulnerable worldwide. The attacks have been linked to the ArcaneDoor threat actor. Exploitation can lead to unauthorized access to sensitive information and potential system compromise. The vulnerability is chained with CVE-2025-20333.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
DoS
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Cisco Asa
Cisco Secure Firewall Asa
Cisco Secure Firewall Threat Defense