HomeCiscoCVE-2025-20333

CVE-2025-20333

CRITICAL
9.9CVSS
Published: 2025-09-25
Updated: 2025-10-28
AI Analysis

Description

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-120

Metadata

Primary Vendor
CISCO
Published
9/25/2025
Last Modified
10/28/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cisco : adaptive_security_appliance_softwarecisco : adaptive_security_appliance_softwarecisco : adaptive_security_appliance_softwarecisco : adaptive_security_appliance_softwarecisco : adaptive_security_appliance_softwarecisco : adaptive_security_appliance_softwarecisco : adaptive_security_appliance_softwarecisco : adaptive_security_appliance_softwarecisco : firepower_threat_defensecisco : firepower_threat_defensecisco : firepower_threat_defensecisco : firepower_threat_defense

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-20333 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com