A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication.
 This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.
                
            References
                    | Link | Resource | 
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW | Vendor Advisory | 
| https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks | Vendor Advisory | 
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20362 | US Government Resource | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
History
                    28 Oct 2025, 13:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20362 - US Government Resource | 
21 Oct 2025, 23:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 20:20
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 19:21
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
26 Sep 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication. | 
26 Sep 2025, 14:09
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Cisco Cisco firepower Threat Defense Cisco adaptive Security Appliance Software | |
| CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* | |
| References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW - Vendor Advisory | |
| References | () https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks - Vendor Advisory | 
25 Sep 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
25 Sep 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-09-25 16:15
Updated : 2025-10-28 13:58
NVD link : CVE-2025-20362
Mitre link : CVE-2025-20362
CVE.ORG link : CVE-2025-20362
JSON object : View
Products Affected
                cisco
- firepower_threat_defense
- adaptive_security_appliance_software
CWE
                
                    
                        
                        CWE-862
                        
            Missing Authorization
