CVE-2025-20363
Cisco · Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software.
A critical vulnerability has been discovered in the web services of multiple widely-used Cisco networking and security products, including firewalls and routers.
Executive summary
A critical vulnerability has been discovered in the web services of multiple widely-used Cisco networking and security products, including firewalls and routers. This flaw allows a remote, unauthenticated attacker to potentially take complete control of an affected device. Successful exploitation could lead to a severe network breach, data theft, and significant operational disruption.
Vulnerability
The vulnerability exists within the web services component accessible on various Cisco devices. An unauthenticated, remote attacker can exploit this flaw by sending a specially crafted request to the web services interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges, effectively granting them complete control over the system.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.0. Exploitation could have a devastating impact on business operations, as the affected devices are often core components of an organization's network infrastructure. Potential consequences include an attacker gaining the ability to intercept or redirect network traffic, deploy malware or ransomware into the core network, cause a complete denial of service, and gain a foothold to move laterally across the internal network, compromising sensitive data and critical systems.
Remediation
Immediate Action: The primary remediation is to apply security updates provided by Cisco immediately. Organizations must update all affected Cisco ASA, FTD, IOS, and IOS XE devices to a patched version as specified in the vendor's security advisory. In parallel, security teams should actively monitor for any signs of exploitation attempts and review web service access logs for anomalous activity.
Proactive Monitoring: Monitor web service access logs on affected devices for unusual or malformed requests. Implement network traffic analysis to detect anomalous outbound connections originating from the management interfaces of these devices. Security teams should be vigilant for signs of compromise, such as unexpected system reboots, configuration changes, or the creation of unauthorized user accounts.
Compensating Controls: If patching cannot be performed immediately, implement the following controls to reduce risk:
- Restrict access to the web services management interface to a dedicated, secure management network.
- Use Access Control Lists (ACLs) to block all access to the management interface from the internet and other untrusted network segments.
- If the web services interface is not essential for operations, disable it completely.
- Deploy Intrusion Prevention System (IPS) signatures that specifically target this vulnerability as they become available.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the critical severity (CVSS 9.0) of this vulnerability and the foundational role these Cisco devices play in network security, immediate action is required. We strongly recommend that organizations prioritize the testing and deployment of the security patches provided by Cisco across all affected devices. While this CVE is not yet on the CISA KEV list, its high impact makes it a prime target for future exploitation. If immediate patching is not feasible, the compensating controls outlined above must be implemented without delay to significantly reduce the attack surface.