Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-20127 (GCVE-0-2025-20127)
Vulnerability from cvelistv5 – Published: 2025-08-14 16:28 – Updated: 2025-09-03 17:39- CWE-404 - Improper Resource Shutdown or Release
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Affected:
9.20.1
Affected: 9.20.1.5 Affected: 9.20.2 Affected: 9.20.2.10 Affected: 9.20.2.21 Affected: 9.20.2.22 Affected: 9.20.3 Affected: 9.22.1.1 Affected: 9.20.3.4 Affected: 9.20.3.7 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20127",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-14T18:41:43.684080Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-14T19:21:36.390Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Adaptive Security Appliance (ASA) Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "9.20.1"
},
{
"status": "affected",
"version": "9.20.1.5"
},
{
"status": "affected",
"version": "9.20.2"
},
{
"status": "affected",
"version": "9.20.2.10"
},
{
"status": "affected",
"version": "9.20.2.21"
},
{
"status": "affected",
"version": "9.20.2.22"
},
{
"status": "affected",
"version": "9.20.3"
},
{
"status": "affected",
"version": "9.22.1.1"
},
{
"status": "affected",
"version": "9.20.3.4"
},
{
"status": "affected",
"version": "9.20.3.7"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Firepower Threat Defense Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.4.0"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.4.1.1"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.4.2.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\r\n\r\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\r\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-404",
"description": "Improper Resource Shutdown or Release",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-03T17:39:26.506Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-3100_4200_tlsdos-2yNSCd54",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54"
}
],
"source": {
"advisory": "cisco-sa-3100_4200_tlsdos-2yNSCd54",
"defects": [
"CSCwm91176"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 3100 and 4200 Series TLS Cipher Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20127",
"datePublished": "2025-08-14T16:28:07.785Z",
"dateReserved": "2024-10-10T19:15:13.212Z",
"dateUpdated": "2025-09-03T17:39:26.506Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-20127\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-08-14T17:15:33.907\",\"lastModified\":\"2025-08-25T14:35:24.387\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\\r\\n\\r\\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\\r\\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la implementaci\u00f3n de TLS 1.3 para un cifrado espec\u00edfico del software Cisco Secure Firewall Adaptive Security Appliance (ASA) y del software Cisco Secure Firewall Threat Defense (FTD) para dispositivos Cisco Firepower de las series 3100 y 4200 podr\u00eda permitir que un atacante remoto autenticado consuma recursos asociados con conexiones entrantes TLS 1.3, lo que eventualmente podr\u00eda provocar que el dispositivo deje de aceptar nuevas solicitudes SSL/TLS o VPN. Esta vulnerabilidad se debe a la implementaci\u00f3n del cifrado TLS_CHACHA20_POLY1305_SHA256 de TLS 1.3. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un gran n\u00famero de conexiones TLS 1.3 con el cifrado TLS_CHACHA20_POLY1305_SHA256. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante causar una denegaci\u00f3n de servicio (DoS) donde no se aceptan nuevas conexiones cifradas entrantes. El dispositivo debe reiniciarse para solucionar esta situaci\u00f3n. Nota: Estas conexiones entrantes TLS 1.3 incluyen tanto tr\u00e1fico de datos como de administraci\u00f3n de usuarios. Una vez que el dispositivo se encuentra en estado vulnerable, no se pueden aceptar nuevas conexiones cifradas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-404\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E08AAC-9C5E-4D18-817C-C466D1D6C4DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"724A3B6F-DDAB-4A2F-8430-9E1F352D755F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDBF14DD-0654-47F3-A698-020397A1EAA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8920FFA0-1F84-44FE-A776-4FFA654D8419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7586BFE-973B-4481-A004-20EB1FEB2D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76B73F03-93B6-48C3-BF97-FEAF26895A2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D9FDF8-13BF-425F-9802-1A334065D7C0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87403E0F-659C-4C5B-863D-0274D2828A9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73D24C57-2311-48E9-879E-124472E98F6F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE02D38A-5354-47E6-A46F-06D53F14F5A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F191A423-DB18-4F3A-9D31-C3DD8F185C88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_4215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC379023-9ECB-4BED-B667-5BCFC9872416\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_4225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C4027A-0B7E-4E0F-AD5F-27CB4BBFE558\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_4245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B17ECD44-086D-47B6-A7C8-E0F9DF492D93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B25468E3-03F9-4C2A-B82A-F87F4FCD57E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC6F412-4A30-4E9A-B8DF-C4BF80E5C4B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA47E8EA-29F2-40F3-826E-E7295FFAD8C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4D303F8-E6AA-4F1C-9988-055EECD0A902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DCBBA66-6D00-4D8B-86FE-81EF431A7806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB768AFD-64C1-4AD4-8194-2A1D428BAC67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B6648F1-B019-4A67-A1D6-9B8FD522E393\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53667E6B-7B95-4051-94C6-707789CB15A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6796587-5205-46ED-95D4-0B9DE1499FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.22.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6367AC-F605-472B-9B11-B2FE9AD918A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D9FDF8-13BF-425F-9802-1A334065D7C0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87403E0F-659C-4C5B-863D-0274D2828A9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73D24C57-2311-48E9-879E-124472E98F6F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE02D38A-5354-47E6-A46F-06D53F14F5A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F191A423-DB18-4F3A-9D31-C3DD8F185C88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_4215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC379023-9ECB-4BED-B667-5BCFC9872416\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_4225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C4027A-0B7E-4E0F-AD5F-27CB4BBFE558\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_firewall_4245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B17ECD44-086D-47B6-A7C8-E0F9DF492D93\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20127\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-14T18:41:43.684080Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-14T18:41:46.619Z\"}}], \"cna\": {\"title\": \"Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 3100 and 4200 Series TLS Cipher Denial of Service Vulnerability\", \"source\": {\"defects\": [\"CSCwm91176\"], \"advisory\": \"cisco-sa-3100_4200_tlsdos-2yNSCd54\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Adaptive Security Appliance (ASA) Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.20.1\"}, {\"status\": \"affected\", \"version\": \"9.20.1.5\"}, {\"status\": \"affected\", \"version\": \"9.20.2\"}, {\"status\": \"affected\", \"version\": \"9.20.2.10\"}, {\"status\": \"affected\", \"version\": \"9.20.2.21\"}, {\"status\": \"affected\", \"version\": \"9.20.2.22\"}, {\"status\": \"affected\", \"version\": \"9.20.3\"}, {\"status\": \"affected\", \"version\": \"9.22.1.1\"}, {\"status\": \"affected\", \"version\": \"9.20.3.4\"}, {\"status\": \"affected\", \"version\": \"9.20.3.7\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Firepower Threat Defense Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.4.0\"}, {\"status\": \"affected\", \"version\": \"7.4.1\"}, {\"status\": \"affected\", \"version\": \"7.4.1.1\"}, {\"status\": \"affected\", \"version\": \"7.4.2\"}, {\"status\": \"affected\", \"version\": \"7.6.0\"}, {\"status\": \"affected\", \"version\": \"7.4.2.1\"}], \"defaultStatus\": \"unknown\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54\", \"name\": \"cisco-sa-3100_4200_tlsdos-2yNSCd54\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\\r\\n\\r\\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\\r\\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-404\", \"description\": \"Improper Resource Shutdown or Release\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-09-03T17:39:26.506Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-20127\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-03T17:39:26.506Z\", \"dateReserved\": \"2024-10-10T19:15:13.212Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2025-08-14T16:28:07.785Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CISCO-SA-3100_4200_TLSDOS-2YNSCD54
Vulnerability from csaf_cisco - Published: 2025-08-14 16:00 - Updated: 2025-09-03 13:37{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was found during the resolution of a Cisco TAC support case."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\r\n\r\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\r\n\r\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted.\r\n\r\nCisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.\r\n\r\n\r\n\r\nThis advisory is part of the August 2025 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2025 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75415\"].",
"title": "Summary"
},
{
"category": "general",
"text": "This vulnerability affects Cisco Secure Firewall ASA Software and Cisco Secure FTD Software if they are running on a Cisco Secure Firewall 3100 or 4200 Series device that has an SSL listen socket and is configured to allow the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. This is not the default configuration.\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n Determine Whether a Device Can Process TLS Packets\r\nTo determine whether a device that is running Cisco Secure Firewall ASA Software or Cisco Secure FTD Software can process TLS packets, use the show asp table socket | include SSL command and look for an SSL listening socket on any TCP port. The following example shows the output for a Cisco Secure Firewall ASA device with SSL listen sockets on TCP ports 443 and 8443:\r\n\r\n\r\nciscoasa# show asp table socket | include SSL\r\nSSL 00185038 LISTEN 172.16.0.250:443 0.0.0.0:*\r\nSSL 00188638 LISTEN 10.0.0.250:8443 0.0.0.0:*\r\n\r\n Identify Vulnerable TLS 1.3 Cipher Software Configuration\r\nDevices are affected by this vulnerability only if the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256 is configured. To determine whether a device that is running Cisco Secure Firewall ASA Software or Cisco Secure FTD Software has TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256 configured, use the show running-config all ssl | include TLS_CHACHA20_POLY1305_SHA256 CLI command. If output is returned, as shown in the following example, the device is considered vulnerable:\r\n\r\n\r\nciscoasa# show running-config all ssl | include TLS_CHACHA20_POLY1305_SHA256\r\nssl cipher tlsv1.3 custom \"TLS_CHACHA20_POLY1305_SHA256\"\r\n\r\nIn addition, the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256 could be configured as a cipher if ssl cipher tlsv1.3 high, ssl cipher tlsv1.3 medium, or ssl cipher tlsv1.3 low is present under show running-config all ssl | include tlsv1.3, as shown in the following example:\r\n\r\n\r\nciscoasa# show running-config all ssl | include tlsv1.3\r\nssl cipher tlsv1.3 medium\r\n\r\nIn this case, the administrator should use the show ssl ciphers medium | include v1.3 command to verify if TLS_CHACHA20_POLY1305_SHA256 is configured, as shown in the following example:\r\n\r\n\r\nciscoasa# show ssl ciphers medium | include v1.3\r\n TLS_AES_128_GCM_SHA256 (tlsv1.3)\r\nTLS_CHACHA20_POLY1305_SHA256 (tlsv1.3)\r\nTLS_AES_256_GCM_SHA384 (tlsv1.3)",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco Secure Firewall Management Center (FMC) Software.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "This vulnerability causes devices to run out of Security Context Block (SCB) handles, which are used to process all incoming encrypted connections, including SSL, VPN, TLS, and Internet Key Exchange (IKE). Look for the following two indicators of compromise that could be present if this vulnerability is being exploited:\r\n\r\nLogged SSL Errors\r\n\r\nThe show ssl errors CLI command could show the following repeating errors:\r\n\r\n\r\nerror:1424A044:SSL routines:write_state_machine:internal error@libssl_ext_hndshk_accel.c:87\r\nerror:1424A044:SSL routines:write_state_machine:internal error@libssl_ext_hndshk_accel.c:87\r\n\r\nSSL Error Counters\r\n\r\nThe show counters | include HANDLE_ALLOC_FAILED counter would be incrementing rapidly, as shown in the following example:\r\n\r\n\r\nciscoasa# show counters | include HANDLE_ALLOC_FAILED\r\nCRYPTO HANDLE_ALLOC_FAILED 56169 Summary\r\n\r\nNote: When a device is in this failed state, a reboot is required to restore connectivity.",
"title": "Indicators of Compromise"
},
{
"category": "general",
"text": "There is a workaround that addresses this vulnerability. Use the no ssl cipher tlsv1.3 custom \u003ccipher list\u003e CLI command to remove the cipher.\r\n\r\nWhile this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu\"] that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.\r\n\r\nCustomers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nThe Cisco Support and Downloads page [\"https://www.cisco.com/c/en/us/support/index.html\"] on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"]. This tool identifies any Cisco security advisories that impact a specific software release and the earliest release that fixes the vulnerabilities that are described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities that are described in all the advisories that the Software Checker identifies (\u201cCombined First Fixed\u201d).\r\n\r\nTo use the tool, go to the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] page and follow the instructions. Alternatively, use the following form to search for vulnerabilities that affect a specific software release. To use the form, follow these steps:\r\n\r\nChoose which advisories the tool will search\u2014all advisories, only advisories with a Critical or High Security Impact Rating (SIR) [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#asr\"], or only this advisory.\r\nChoose the appropriate software.\r\nChoose the appropriate platform.\r\nEnter a release number\u2014for example, 9.20.3.4 for Cisco Secure Firewall ASA Software or 7.4.2 for Cisco Secure FTD Software.\r\nClick Check.\r\n Only this advisory All Critical and High advisories All advisories Cisco ASA Software Cisco FMC Software Cisco FTD Software Any Platform 3000 Series Industrial Security Appliances (ISA) ASA 5500-X Series Firewalls ASA Service Module Adaptive Security Virtual Appliance (ASAv) Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9000 Series Firepower NGFW Virtual Secure Firewall 1200 Series Secure Firewall 3100 Series Secure Firewall 4200 Series Firepower Management Center Appliances\r\n\r\n\r\n\r\n\r\nFor instructions on upgrading a Cisco Secure FTD device, see the appropriate Cisco Secure FMC upgrade guide [\"https://www.cisco.com/c/en/us/support/security/defense-center/products-installation-guides-list.html\"].\r\n Additional Resources\r\nFor help determining the best Cisco Secure Firewall ASA, Secure FMC, or Secure FTD Software release, see the following Recommended Releases documents. If a security advisory recommends a later release, Cisco recommends following the advisory guidance.\r\n\r\nCisco Secure Firewall ASA Compatibility [\"https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html\"]\r\nCisco Secure Firewall ASA Upgrade Guide [\"https://www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.html\"]\r\nCisco Secure Firewall Threat Defense Compatibility Guide [\"https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/compatibility/threat-defense-compatibility.html\"]",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was found during the resolution of a Cisco TAC support case.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54"
},
{
"category": "external",
"summary": "Cisco Event Response: August 2025 Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75415"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "free software updates",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "Cisco Support and Downloads page",
"url": "https://www.cisco.com/c/en/us/support/index.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Cisco Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Security Impact Rating (SIR)",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#asr"
},
{
"category": "external",
"summary": "Cisco Secure FMC upgrade guide",
"url": "https://www.cisco.com/c/en/us/support/security/defense-center/products-installation-guides-list.html"
},
{
"category": "external",
"summary": "Cisco Secure Firewall ASA Compatibility",
"url": "https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html"
},
{
"category": "external",
"summary": "Cisco Secure Firewall ASA Upgrade Guide",
"url": "https://www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.html"
},
{
"category": "external",
"summary": "Cisco Secure Firewall Threat Defense Compatibility Guide",
"url": "https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/compatibility/threat-defense-compatibility.html"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"
}
],
"title": "Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability",
"tracking": {
"current_release_date": "2025-09-03T13:37:50+00:00",
"generator": {
"date": "2025-09-03T13:37:53+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-3100_4200_tlsdos-2yNSCd54",
"initial_release_date": "2025-08-14T16:00:00+00:00",
"revision_history": [
{
"date": "2025-08-14T15:53:42+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2025-09-03T13:37:50+00:00",
"number": "1.1.0",
"summary": "Updated the configuration example for the problematic cipher."
}
],
"status": "final",
"version": "1.1.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "9.20.1",
"product": {
"name": "9.20.1",
"product_id": "CSAFPID-300766"
}
},
{
"category": "service_pack",
"name": "9.20.1.5",
"product": {
"name": "9.20.1.5",
"product_id": "CSAFPID-300898"
}
},
{
"category": "service_pack",
"name": "9.20.2",
"product": {
"name": "9.20.2",
"product_id": "CSAFPID-301114"
}
},
{
"category": "service_pack",
"name": "9.20.2.10",
"product": {
"name": "9.20.2.10",
"product_id": "CSAFPID-301294"
}
},
{
"category": "service_pack",
"name": "9.20.2.21",
"product": {
"name": "9.20.2.21",
"product_id": "CSAFPID-301717"
}
},
{
"category": "service_pack",
"name": "9.20.2.22",
"product": {
"name": "9.20.2.22",
"product_id": "CSAFPID-301753"
}
},
{
"category": "service_pack",
"name": "9.20.3",
"product": {
"name": "9.20.3",
"product_id": "CSAFPID-302685"
}
},
{
"category": "service_pack",
"name": "9.20.3.4",
"product": {
"name": "9.20.3.4",
"product_id": "CSAFPID-302892"
}
},
{
"category": "service_pack",
"name": "9.20.3.7",
"product": {
"name": "9.20.3.7",
"product_id": "CSAFPID-302992"
}
}
],
"category": "product_version",
"name": "9.20"
},
{
"branches": [
{
"category": "service_pack",
"name": "9.22.1.1",
"product": {
"name": "9.22.1.1",
"product_id": "CSAFPID-302876"
}
}
],
"category": "product_version",
"name": "9.22"
}
],
"category": "product_family",
"name": "Cisco Adaptive Security Appliance (ASA) Software"
},
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "7.4.0",
"product": {
"name": "7.4.0",
"product_id": "CSAFPID-300737"
}
},
{
"category": "service_pack",
"name": "7.4.1",
"product": {
"name": "7.4.1",
"product_id": "CSAFPID-301109"
}
},
{
"category": "service_pack",
"name": "7.4.1.1",
"product": {
"name": "7.4.1.1",
"product_id": "CSAFPID-301606"
}
},
{
"category": "service_pack",
"name": "7.4.2",
"product": {
"name": "7.4.2",
"product_id": "CSAFPID-302686"
}
},
{
"category": "service_pack",
"name": "7.4.2.1",
"product": {
"name": "7.4.2.1",
"product_id": "CSAFPID-302966"
}
}
],
"category": "product_version",
"name": "7.4"
},
{
"branches": [
{
"category": "service_pack",
"name": "7.6.0",
"product": {
"name": "7.6.0",
"product_id": "CSAFPID-302870"
}
}
],
"category": "product_version",
"name": "7.6"
}
],
"category": "product_family",
"name": "Cisco Firepower Threat Defense Software"
},
{
"category": "product_name",
"name": "Cisco Secure Firewall 3100 Series",
"product": {
"name": "Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-286865"
}
},
{
"category": "product_name",
"name": "Cisco Secure Firewall 4200 Series",
"product": {
"name": "Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-300754"
}
}
],
"category": "vendor",
"name": "Cisco"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.1 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-300766:300754"
},
"product_reference": "CSAFPID-300766",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.1.5 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-300898:300754"
},
"product_reference": "CSAFPID-300898",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.2 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-301114:286865"
},
"product_reference": "CSAFPID-301114",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.2 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-301114:300754"
},
"product_reference": "CSAFPID-301114",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.2.10 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-301294:286865"
},
"product_reference": "CSAFPID-301294",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.2.10 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-301294:300754"
},
"product_reference": "CSAFPID-301294",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.2.21 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-301717:286865"
},
"product_reference": "CSAFPID-301717",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.2.21 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-301717:300754"
},
"product_reference": "CSAFPID-301717",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.2.22 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-301753:286865"
},
"product_reference": "CSAFPID-301753",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.2.22 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-301753:300754"
},
"product_reference": "CSAFPID-301753",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.3 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-302685:286865"
},
"product_reference": "CSAFPID-302685",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.3 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-302685:300754"
},
"product_reference": "CSAFPID-302685",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.3.4 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-302892:286865"
},
"product_reference": "CSAFPID-302892",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.3.4 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-302892:300754"
},
"product_reference": "CSAFPID-302892",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.3.7 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-302992:286865"
},
"product_reference": "CSAFPID-302992",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.20.3.7 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-302992:300754"
},
"product_reference": "CSAFPID-302992",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.22.1.1 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-302876:286865"
},
"product_reference": "CSAFPID-302876",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Adaptive Security Appliance (ASA) Software 9.22.1.1 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-302876:300754"
},
"product_reference": "CSAFPID-302876",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.0 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-300737:300754"
},
"product_reference": "CSAFPID-300737",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.1 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-301109:286865"
},
"product_reference": "CSAFPID-301109",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.1 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-301109:300754"
},
"product_reference": "CSAFPID-301109",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.1.1 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-301606:286865"
},
"product_reference": "CSAFPID-301606",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.1.1 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-301606:300754"
},
"product_reference": "CSAFPID-301606",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.2 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-302686:286865"
},
"product_reference": "CSAFPID-302686",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.2 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-302686:300754"
},
"product_reference": "CSAFPID-302686",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.2.1 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-302966:286865"
},
"product_reference": "CSAFPID-302966",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.4.2.1 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-302966:300754"
},
"product_reference": "CSAFPID-302966",
"relates_to_product_reference": "CSAFPID-300754"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.6.0 when installed on Cisco Secure Firewall 3100 Series",
"product_id": "CSAFPID-302870:286865"
},
"product_reference": "CSAFPID-302870",
"relates_to_product_reference": "CSAFPID-286865"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Threat Defense Software 7.6.0 when installed on Cisco Secure Firewall 4200 Series",
"product_id": "CSAFPID-302870:300754"
},
"product_reference": "CSAFPID-302870",
"relates_to_product_reference": "CSAFPID-300754"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-20127",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCwm91176"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-300737:300754",
"CSAFPID-301109:286865",
"CSAFPID-301109:300754",
"CSAFPID-301606:286865",
"CSAFPID-301606:300754",
"CSAFPID-302686:286865",
"CSAFPID-302686:300754",
"CSAFPID-302870:286865",
"CSAFPID-302870:300754",
"CSAFPID-302966:286865",
"CSAFPID-302966:300754",
"CSAFPID-300766:300754",
"CSAFPID-300898:300754",
"CSAFPID-301114:286865",
"CSAFPID-301114:300754",
"CSAFPID-301294:286865",
"CSAFPID-301294:300754",
"CSAFPID-301717:286865",
"CSAFPID-301717:300754",
"CSAFPID-301753:286865",
"CSAFPID-301753:300754",
"CSAFPID-302685:286865",
"CSAFPID-302685:300754",
"CSAFPID-302876:286865",
"CSAFPID-302876:300754",
"CSAFPID-302892:286865",
"CSAFPID-302892:300754",
"CSAFPID-302992:286865",
"CSAFPID-302992:300754"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-300737:300754",
"CSAFPID-301109:286865",
"CSAFPID-301109:300754",
"CSAFPID-301606:286865",
"CSAFPID-301606:300754",
"CSAFPID-302686:286865",
"CSAFPID-302686:300754",
"CSAFPID-302870:286865",
"CSAFPID-302870:300754",
"CSAFPID-302966:286865",
"CSAFPID-302966:300754",
"CSAFPID-300766:300754",
"CSAFPID-300898:300754",
"CSAFPID-301114:286865",
"CSAFPID-301114:300754",
"CSAFPID-301294:286865",
"CSAFPID-301294:300754",
"CSAFPID-301717:286865",
"CSAFPID-301717:300754",
"CSAFPID-301753:286865",
"CSAFPID-301753:300754",
"CSAFPID-302685:286865",
"CSAFPID-302685:300754",
"CSAFPID-302876:286865",
"CSAFPID-302876:300754",
"CSAFPID-302892:286865",
"CSAFPID-302892:300754",
"CSAFPID-302992:286865",
"CSAFPID-302992:300754"
],
"url": "https://software.cisco.com"
},
{
"category": "workaround",
"details": "There is a workaround that addresses this vulnerability. Use the no ssl cipher tlsv1.3 custom \u003ccipher list\u003e CLI command to remove the cipher.\r\n\r\nWhile this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.",
"product_ids": [
"CSAFPID-300737:300754",
"CSAFPID-301109:286865",
"CSAFPID-301109:300754",
"CSAFPID-301606:286865",
"CSAFPID-301606:300754",
"CSAFPID-302686:286865",
"CSAFPID-302686:300754",
"CSAFPID-302870:286865",
"CSAFPID-302870:300754",
"CSAFPID-302966:286865",
"CSAFPID-302966:300754",
"CSAFPID-300766:300754",
"CSAFPID-300898:300754",
"CSAFPID-301114:286865",
"CSAFPID-301114:300754",
"CSAFPID-301294:286865",
"CSAFPID-301294:300754",
"CSAFPID-301717:286865",
"CSAFPID-301717:300754",
"CSAFPID-301753:286865",
"CSAFPID-301753:300754",
"CSAFPID-302685:286865",
"CSAFPID-302685:300754",
"CSAFPID-302876:286865",
"CSAFPID-302876:300754",
"CSAFPID-302892:286865",
"CSAFPID-302892:300754",
"CSAFPID-302992:286865",
"CSAFPID-302992:300754"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-300737:300754",
"CSAFPID-301109:286865",
"CSAFPID-301109:300754",
"CSAFPID-301606:286865",
"CSAFPID-301606:300754",
"CSAFPID-302686:286865",
"CSAFPID-302686:300754",
"CSAFPID-302870:286865",
"CSAFPID-302870:300754",
"CSAFPID-302966:286865",
"CSAFPID-302966:300754",
"CSAFPID-300766:300754",
"CSAFPID-300898:300754",
"CSAFPID-301114:286865",
"CSAFPID-301114:300754",
"CSAFPID-301294:286865",
"CSAFPID-301294:300754",
"CSAFPID-301717:286865",
"CSAFPID-301717:300754",
"CSAFPID-301753:286865",
"CSAFPID-301753:300754",
"CSAFPID-302685:286865",
"CSAFPID-302685:300754",
"CSAFPID-302876:286865",
"CSAFPID-302876:300754",
"CSAFPID-302892:286865",
"CSAFPID-302892:300754",
"CSAFPID-302992:286865",
"CSAFPID-302992:300754"
]
}
],
"title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 3100 and 4200 Series TLS Cipher Denial of Service Vulnerability"
}
]
}
CERTFR-2025-AVI-0708
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer au bulletin de l\u0027\u00e9diteur (cf. section Documentation) pour les syst\u00e8mes affect\u00e9s.",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20253"
},
{
"name": "CVE-2025-20148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20148"
},
{
"name": "CVE-2025-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20265"
},
{
"name": "CVE-2025-20134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20134"
},
{
"name": "CVE-2025-20263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20263"
},
{
"name": "CVE-2025-20127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20127"
},
{
"name": "CVE-2025-20133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20133"
},
{
"name": "CVE-2025-20136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20136"
},
{
"name": "CVE-2025-20254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20254"
},
{
"name": "CVE-2025-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20217"
},
{
"name": "CVE-2025-20224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20224"
},
{
"name": "CVE-2025-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20225"
},
{
"name": "CVE-2025-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20243"
},
{
"name": "CVE-2025-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20239"
},
{
"name": "CVE-2025-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20244"
},
{
"name": "CVE-2025-20222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20222"
},
{
"name": "CVE-2025-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20251"
},
{
"name": "CVE-2025-20252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20252"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0708",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-3100",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-radius-rce-TNBKf79",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-html-inj-MqjrZrny",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fp2k-IPsec-dos-tjwgdZCO",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-buffer-overflow-PyRUhWBC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-dos-SvKhtjgt",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-http-file-hUyX2jL4",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-ftd-ios-dos-DOESHWHy",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-ssltls-dos-eHw76vZe",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-nat-dns-dos-bqhynHTM",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-vpn-dos-mfPekA6e",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e"
}
]
}
CERTFR-2025-AVI-0708
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer au bulletin de l\u0027\u00e9diteur (cf. section Documentation) pour les syst\u00e8mes affect\u00e9s.",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20253"
},
{
"name": "CVE-2025-20148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20148"
},
{
"name": "CVE-2025-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20265"
},
{
"name": "CVE-2025-20134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20134"
},
{
"name": "CVE-2025-20263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20263"
},
{
"name": "CVE-2025-20127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20127"
},
{
"name": "CVE-2025-20133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20133"
},
{
"name": "CVE-2025-20136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20136"
},
{
"name": "CVE-2025-20254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20254"
},
{
"name": "CVE-2025-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20217"
},
{
"name": "CVE-2025-20224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20224"
},
{
"name": "CVE-2025-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20225"
},
{
"name": "CVE-2025-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20243"
},
{
"name": "CVE-2025-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20239"
},
{
"name": "CVE-2025-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20244"
},
{
"name": "CVE-2025-20222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20222"
},
{
"name": "CVE-2025-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20251"
},
{
"name": "CVE-2025-20252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20252"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0708",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-3100",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-radius-rce-TNBKf79",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-html-inj-MqjrZrny",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fp2k-IPsec-dos-tjwgdZCO",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-buffer-overflow-PyRUhWBC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-dos-SvKhtjgt",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-http-file-hUyX2jL4",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-ftd-ios-dos-DOESHWHy",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-ssltls-dos-eHw76vZe",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-nat-dns-dos-bqhynHTM",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-vpn-dos-mfPekA6e",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e"
}
]
}
FKIE_CVE-2025-20127
Vulnerability from fkie_nvd - Published: 2025-08-14 17:15 - Updated: 2025-08-25 14:35| Vendor | Product | Version | |
|---|---|---|---|
| cisco | firepower_threat_defense | 7.4.0 | |
| cisco | firepower_threat_defense | 7.4.1 | |
| cisco | firepower_threat_defense | 7.4.1.1 | |
| cisco | firepower_threat_defense | 7.4.2 | |
| cisco | firepower_threat_defense | 7.4.2.1 | |
| cisco | firepower_threat_defense | 7.6.0 | |
| cisco | secure_firewall_3105 | - | |
| cisco | secure_firewall_3110 | - | |
| cisco | secure_firewall_3120 | - | |
| cisco | secure_firewall_3130 | - | |
| cisco | secure_firewall_3140 | - | |
| cisco | secure_firewall_4215 | - | |
| cisco | secure_firewall_4225 | - | |
| cisco | secure_firewall_4245 | - | |
| cisco | adaptive_security_appliance_software | 9.20.1 | |
| cisco | adaptive_security_appliance_software | 9.20.1.5 | |
| cisco | adaptive_security_appliance_software | 9.20.2 | |
| cisco | adaptive_security_appliance_software | 9.20.2.10 | |
| cisco | adaptive_security_appliance_software | 9.20.2.21 | |
| cisco | adaptive_security_appliance_software | 9.20.2.22 | |
| cisco | adaptive_security_appliance_software | 9.20.3 | |
| cisco | adaptive_security_appliance_software | 9.20.3.4 | |
| cisco | adaptive_security_appliance_software | 9.20.3.7 | |
| cisco | adaptive_security_appliance_software | 9.22.1.1 | |
| cisco | secure_firewall_3105 | - | |
| cisco | secure_firewall_3110 | - | |
| cisco | secure_firewall_3120 | - | |
| cisco | secure_firewall_3130 | - | |
| cisco | secure_firewall_3140 | - | |
| cisco | secure_firewall_4215 | - | |
| cisco | secure_firewall_4225 | - | |
| cisco | secure_firewall_4245 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E08AAC-9C5E-4D18-817C-C466D1D6C4DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "724A3B6F-DDAB-4A2F-8430-9E1F352D755F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BDBF14DD-0654-47F3-A698-020397A1EAA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8920FFA0-1F84-44FE-A776-4FFA654D8419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7586BFE-973B-4481-A004-20EB1FEB2D6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76B73F03-93B6-48C3-BF97-FEAF26895A2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D9FDF8-13BF-425F-9802-1A334065D7C0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87403E0F-659C-4C5B-863D-0274D2828A9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73D24C57-2311-48E9-879E-124472E98F6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE02D38A-5354-47E6-A46F-06D53F14F5A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F191A423-DB18-4F3A-9D31-C3DD8F185C88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC379023-9ECB-4BED-B667-5BCFC9872416",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_4225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05C4027A-0B7E-4E0F-AD5F-27CB4BBFE558",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_4245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B17ECD44-086D-47B6-A7C8-E0F9DF492D93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B25468E3-03F9-4C2A-B82A-F87F4FCD57E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC6F412-4A30-4E9A-B8DF-C4BF80E5C4B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DA47E8EA-29F2-40F3-826E-E7295FFAD8C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D303F8-E6AA-4F1C-9988-055EECD0A902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2DCBBA66-6D00-4D8B-86FE-81EF431A7806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "AB768AFD-64C1-4AD4-8194-2A1D428BAC67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6648F1-B019-4A67-A1D6-9B8FD522E393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "53667E6B-7B95-4051-94C6-707789CB15A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C6796587-5205-46ED-95D4-0B9DE1499FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.22.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B6367AC-F605-472B-9B11-B2FE9AD918A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D9FDF8-13BF-425F-9802-1A334065D7C0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87403E0F-659C-4C5B-863D-0274D2828A9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73D24C57-2311-48E9-879E-124472E98F6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE02D38A-5354-47E6-A46F-06D53F14F5A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F191A423-DB18-4F3A-9D31-C3DD8F185C88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC379023-9ECB-4BED-B667-5BCFC9872416",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_4225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05C4027A-0B7E-4E0F-AD5F-27CB4BBFE558",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:secure_firewall_4245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B17ECD44-086D-47B6-A7C8-E0F9DF492D93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\r\n\r\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\r\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la implementaci\u00f3n de TLS 1.3 para un cifrado espec\u00edfico del software Cisco Secure Firewall Adaptive Security Appliance (ASA) y del software Cisco Secure Firewall Threat Defense (FTD) para dispositivos Cisco Firepower de las series 3100 y 4200 podr\u00eda permitir que un atacante remoto autenticado consuma recursos asociados con conexiones entrantes TLS 1.3, lo que eventualmente podr\u00eda provocar que el dispositivo deje de aceptar nuevas solicitudes SSL/TLS o VPN. Esta vulnerabilidad se debe a la implementaci\u00f3n del cifrado TLS_CHACHA20_POLY1305_SHA256 de TLS 1.3. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un gran n\u00famero de conexiones TLS 1.3 con el cifrado TLS_CHACHA20_POLY1305_SHA256. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante causar una denegaci\u00f3n de servicio (DoS) donde no se aceptan nuevas conexiones cifradas entrantes. El dispositivo debe reiniciarse para solucionar esta situaci\u00f3n. Nota: Estas conexiones entrantes TLS 1.3 incluyen tanto tr\u00e1fico de datos como de administraci\u00f3n de usuarios. Una vez que el dispositivo se encuentra en estado vulnerable, no se pueden aceptar nuevas conexiones cifradas."
}
],
"id": "CVE-2025-20127",
"lastModified": "2025-08-25T14:35:24.387",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2025-08-14T17:15:33.907",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-404"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
BDU:2025-10339
Vulnerability from fstec - Published: 14.08.2025{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9.20.1 (Adaptive Security Appliance), 9.20.1.5 (Adaptive Security Appliance), 9.20.2 (Adaptive Security Appliance), 7.4.0 (Firepower Threat Defense), 7.4.1 (Firepower Threat Defense), 9.20.2.10 (Adaptive Security Appliance), 9.20.2.21 (Adaptive Security Appliance), 9.20.2.22 (Adaptive Security Appliance), 7.4.1.1 (Firepower Threat Defense), 9.20.3 (Adaptive Security Appliance), 7.4.2 (Firepower Threat Defense), 9.20.3.4 (Adaptive Security Appliance), 9.20.3.7 (Adaptive Security Appliance), 9.22.1.1 (Adaptive Security Appliance), 7.4.2.1 (Firepower Threat Defense), 7.6.0 (Firepower Threat Defense)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "27.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "27.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-10339",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-20127",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Adaptive Security Appliance, Firepower Threat Defense",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 TLS \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u043e\u0432 Cisco Adaptive Security Appliance (ASA) \u0438 Cisco Firepower Threat Defense (FTD) \u0441\u0435\u0440\u0438\u0439 Firepower 3100 Series \u0438 Firepower 4200 Series, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 TLS \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u043e\u0432 Cisco Adaptive Security Appliance (ASA) \u0438 Cisco Firepower Threat Defense (FTD) \u0441\u0435\u0440\u0438\u0439 Firepower 3100 Series \u0438 Firepower 4200 Series \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u043e\u0439 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,7)"
}
GHSA-PGH5-2R5J-H8RF
Vulnerability from github – Published: 2025-08-14 18:31 – Updated: 2025-08-14 18:31A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.
This vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition. Note: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted.
{
"affected": [],
"aliases": [
"CVE-2025-20127"
],
"database_specific": {
"cwe_ids": [
"CWE-404"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-14T17:15:33Z",
"severity": "HIGH"
},
"details": "A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\n\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted.",
"id": "GHSA-pgh5-2r5j-h8rf",
"modified": "2025-08-14T18:31:28Z",
"published": "2025-08-14T18:31:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20127"
},
{
"type": "WEB",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
NCSC-2025-0264
Vulnerability from csaf_ncscnl - Published: 2025-08-15 08:52 - Updated: 2025-08-15 08:52| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Secure Firewall Software (inclusief ASA en FTD).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich in de manier waarop Cisco Secure Firewall de sleutel uitwisseling afhandeld (IKEv2), hiermee is het mogelijk voor een ongeauthenticeerde aanvaller om een Denial-of-Service aanval uit te voeren. De kwetsbaarheid met kenmerk CVE-2025-20265 bevind zich in de implementatie van het RADIUS-subsysteem, hierdoor is het mogelijk voor een ongeauthenticeerde kwaadwillende om willekeurige commando\u0027s uit te voeren op het onderliggende systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Cisco heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Neutralization of Expression/Command Delimiters",
"title": "CWE-146"
},
{
"category": "general",
"text": "Internal Asset Exposed to Unsafe Debug Access Level or State",
"title": "CWE-1244"
},
{
"category": "general",
"text": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)",
"title": "CWE-643"
},
{
"category": "general",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "general",
"text": "Improper Handling of Values",
"title": "CWE-229"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75415"
}
],
"title": "Kwetsbaarheden verholpen in Cisco Secure Firewall Software",
"tracking": {
"current_release_date": "2025-08-15T08:52:41.012811Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0264",
"initial_release_date": "2025-08-15T08:52:41.012811Z",
"revision_history": [
{
"date": "2025-08-15T08:52:41.012811Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:cisco/unknown",
"product": {
"name": "vers:cisco/unknown",
"product_id": "CSAFPID-3054139"
}
}
],
"category": "product_name",
"name": "Cisco Firepower Management Center Appliances"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/7.7.0",
"product": {
"name": "vers:unknown/7.7.0",
"product_id": "CSAFPID-3053803"
}
}
],
"category": "product_name",
"name": "Cisco Firepower Threat Defense Software"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:cisco/unknown",
"product": {
"name": "vers:cisco/unknown",
"product_id": "CSAFPID-1753655"
}
}
],
"category": "product_name",
"name": "Cisco Secure Firewall 3100 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:cisco/unknown",
"product": {
"name": "vers:cisco/unknown",
"product_id": "CSAFPID-1753671"
}
}
],
"category": "product_name",
"name": "Cisco Secure Firewall 4200 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.23.1",
"product": {
"name": "vers:unknown/9.23.1",
"product_id": "CSAFPID-3053795"
}
}
],
"category": "product_name",
"name": "Cisco Adaptive Security Appliance (ASA) Software"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:cisco/unknown",
"product": {
"name": "vers:cisco/unknown",
"product_id": "CSAFPID-2818039"
}
}
],
"category": "product_name",
"name": "Cisco Adaptive Security Virtual Appliance (ASAv)"
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-20127",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20127 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20127.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20127"
},
{
"cve": "CVE-2025-20133",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20133"
},
{
"cve": "CVE-2025-20134",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20134 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20134.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20134"
},
{
"cve": "CVE-2025-20135",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20135 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20135"
},
{
"cve": "CVE-2025-20136",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20136 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20136.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20136"
},
{
"cve": "CVE-2025-20148",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20148 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20148.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20148"
},
{
"cve": "CVE-2025-20217",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20217 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20217.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20217"
},
{
"cve": "CVE-2025-20218",
"cwe": {
"id": "CWE-643",
"name": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)",
"title": "CWE-643"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20218 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20218"
},
{
"cve": "CVE-2025-20219",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20219 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20219"
},
{
"cve": "CVE-2025-20220",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20220 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20220.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20220"
},
{
"cve": "CVE-2025-20222",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20222 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20222.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20222"
},
{
"cve": "CVE-2025-20224",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20224 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20224.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20224"
},
{
"cve": "CVE-2025-20225",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20225 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20225.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20225"
},
{
"cve": "CVE-2025-20235",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20235 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20235.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20235"
},
{
"cve": "CVE-2025-20237",
"cwe": {
"id": "CWE-146",
"name": "Improper Neutralization of Expression/Command Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Expression/Command Delimiters",
"title": "CWE-146"
},
{
"category": "other",
"text": "Internal Asset Exposed to Unsafe Debug Access Level or State",
"title": "CWE-1244"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20237 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20237"
},
{
"cve": "CVE-2025-20238",
"cwe": {
"id": "CWE-1244",
"name": "Internal Asset Exposed to Unsafe Debug Access Level or State"
},
"notes": [
{
"category": "other",
"text": "Internal Asset Exposed to Unsafe Debug Access Level or State",
"title": "CWE-1244"
},
{
"category": "other",
"text": "Improper Neutralization of Expression/Command Delimiters",
"title": "CWE-146"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20238 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20238"
},
{
"cve": "CVE-2025-20239",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20239 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20239.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20239"
},
{
"cve": "CVE-2025-20243",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20243 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20243"
},
{
"cve": "CVE-2025-20244",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20244 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20244.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20244"
},
{
"cve": "CVE-2025-20251",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20251 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20251"
},
{
"cve": "CVE-2025-20252",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20252 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20252.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20252"
},
{
"cve": "CVE-2025-20253",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20253 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20253.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20253"
},
{
"cve": "CVE-2025-20254",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20254 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20254"
},
{
"cve": "CVE-2025-20263",
"cwe": {
"id": "CWE-680",
"name": "Integer Overflow to Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20263 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20263.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20263"
},
{
"cve": "CVE-2025-20265",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20265 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20265.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20265"
},
{
"cve": "CVE-2025-20268",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Values",
"title": "CWE-229"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20268 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20268.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20268"
},
{
"cve": "CVE-2025-20301",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20301 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20301.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20301"
},
{
"cve": "CVE-2025-20302",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20302 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20302.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20302"
},
{
"cve": "CVE-2025-20306",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20306 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20306.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20306"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.