CVE-2025-20133 – Cisco Secure Firewall ASA/FTD Remote Access SSL VPN DoS Vulnerability

The following table lists the changes that have been made to the
CVE-2025-20133 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 14, 2025

    Action Type Old Value New Value
    Added Description A vulnerability in the management and VPN web servers of the Remote Access SSL VPN feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly stop responding, resulting in a DoS condition.

    This vulnerability is due to ineffective validation of user-supplied input during the Remote Access SSL VPN authentication process. An attacker could exploit this vulnerability by sending a crafted request to the VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition where the device stops responding to Remote Access SSL VPN authentication requests.

    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
    Added CWE CWE-401
    Added Reference https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e
Share the Post:

Related Posts