A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.
This vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.
Note: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
25 Aug 2025, 14:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54 - Vendor Advisory | |
First Time |
Cisco firepower Threat Defense
Cisco adaptive Security Appliance Software Cisco secure Firewall 3110 Cisco secure Firewall 4225 Cisco secure Firewall 4215 Cisco secure Firewall 3120 Cisco secure Firewall 3130 Cisco Cisco secure Firewall 4245 Cisco secure Firewall 3105 Cisco secure Firewall 3140 |
|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.10:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3.7:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_firewall_4215:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.4.2.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1.5:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_firewall_4245:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.4.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.21:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.22:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.22.1.1:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.4.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_firewall_4225:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.6.0:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.4.0:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_firewall_3105:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1:*:*:*:*:*:*:* |
|
Summary |
|
14 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-14 17:15
Updated : 2025-08-25 14:35
NVD link : CVE-2025-20127
Mitre link : CVE-2025-20127
CVE.ORG link : CVE-2025-20127
JSON object : View
Products Affected
cisco
- secure_firewall_3120
- secure_firewall_4225
- firepower_threat_defense
- secure_firewall_3105
- adaptive_security_appliance_software
- secure_firewall_3130
- secure_firewall_3140
- secure_firewall_4245
- secure_firewall_3110
- secure_firewall_4215
CWE
CWE-404
Improper Resource Shutdown or Release