CVE-2025-20251

A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to create or delete arbitrary files on the underlying operating system. If critical system files are manipulated, new Remote Access SSL VPN sessions could be denied and existing sessions could be dropped, causing a denial of service (DoS) condition. An exploited device requires a manual reboot to recover. This vulnerability is due to insufficient input validation when processing HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to create or delete files on the underlying operating system, which could cause the Remote Access SSL VPN service to become unresponsive. To exploit this vulnerability, the attacker must be authenticated as a VPN user of the affected device.
Configurations

No configuration.

History

14 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-14 17:15

Updated : 2025-08-15 13:12


NVD link : CVE-2025-20251

Mitre link : CVE-2025-20251

CVE.ORG link : CVE-2025-20251


JSON object : View

Products Affected

No product.

CWE
CWE-1287

Improper Validation of Specified Type of Input