CVE-2025-20251
Cisco · Cisco Multiple Products (Cisco Secure Firewall ASA Software and Cisco Secure Firewall FTD Software)
A high-severity vulnerability has been identified in widely used Cisco firewall products.
Executive summary
A high-severity vulnerability has been identified in widely used Cisco firewall products. This flaw allows an authenticated remote attacker to create or delete any file on the underlying system, which could lead to a complete device takeover or render it inoperable, posing a significant risk to network security and stability.
Vulnerability
This vulnerability exists within the Remote Access SSL VPN service of the affected software. An attacker who has successfully authenticated to the SSL VPN service can send specially crafted requests to the device. Due to improper input validation, these requests can be used to traverse the file system and create or delete arbitrary files with elevated privileges, potentially leading to a denial-of-service condition or remote code execution.
Business impact
With a CVSS score of 8.5, this vulnerability is rated as High severity. Successful exploitation could have a severe impact on business operations. An attacker could cause a denial-of-service (DoS) by deleting critical system files, leading to network outages and business disruption. Alternatively, an attacker could create files, such as a web shell or malicious scripts, to achieve persistent remote code execution (RCE) on the firewall, compromising the network perimeter, enabling data exfiltration, and allowing lateral movement into the internal network.
Remediation
Immediate Action: Apply the security updates provided by Cisco to all affected Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) devices immediately. Before and after patching, closely monitor devices for any signs of exploitation and thoroughly review remote access and system logs for anomalous activity.
Proactive Monitoring: Implement enhanced monitoring for affected devices. Look for unusual file creation or deletion events in system logs, unexpected service restarts or system reboots, and suspicious activity from authenticated VPN user accounts that deviates from normal behavior patterns. Monitor for connections from unusual IP addresses or at odd hours.
Compensating Controls: If immediate patching is not feasible, consider implementing compensating controls. Restrict SSL VPN access to only essential personnel and trusted IP address ranges. Enforce multi-factor authentication (MFA) for all VPN connections to make it more difficult for an attacker to obtain the required authentication. If available, deploy Intrusion Prevention System (IPS) signatures that can detect and block exploit attempts against this specific vulnerability.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 8.5) and the critical role these firewall devices play in network security, we strongly recommend that the organization prioritizes the immediate deployment of vendor-supplied patches. Although the vulnerability requires an attacker to be authenticated, this pre-requisite can be met using compromised credentials. While not yet listed on the CISA KEV list, the potential for device takeover or complete network disruption warrants treating this vulnerability with the highest urgency.