Monday, December 1

Critical Cisco Vulnerability Let Remote Attackers Execute Arbitrary Code on Firewalls and Routers

0
29

Cybersecurity: Cisco Vulnerability Alert

Cisco has identified a critical remote code execution vulnerability affecting web services across multiple platforms. The vulnerability, tracked as CVE-2025-20363 (CWE-122), has a CVSS 3.1 Base Score of 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). Impacted software includes ASA, FTD, IOS, IOS XE, and IOS XR.

Cisco Input Validation Flaw (CVE-2025-20363)

This vulnerability arises from inadequate validation of user input in HTTP requests. Attackers may exploit this flaw by sending malicious HTTP packets, enabling arbitrary shell command execution as root.

For Cisco Secure Firewall ASA and FTD, exploitation does not require authentication. For IOS, IOS XE, and IOS XR, low-privileged authenticated access is necessary.

Vulnerable services are accessible on SSL or HTTP ports when features like webvpn, AnyConnect SSL VPN, or the HTTP server are active. Successful exploitation could lead to full device compromise.

The vulnerability was discovered by Keane O’Kelley of Cisco ASIG, with advisory coordination by ASD, CSE, NCSC, and CISA.

All ASA Series (5500-X, ASAv, Firepower 1000/2100/4100/9000, Secure Firewall 1200/3100/4200), FTD platforms, IOS routers with SSL VPN, IOS XE routers, and ASR 9001 running 32-bit IOS XR with HTTP enabled are affected.

No workarounds are available. Immediate upgrade to fixed software versions is necessary, as detailed in the Cisco advisory.

Risk Assessment

Risk Factors Details
Affected Products Cisco Secure Firewall ASA & FTD Software, Cisco IOS Software & IOS XE Software, Cisco IOS XR Software (32-bit on ASR 9001 with HTTP server enabled)
Impact Remote unauthenticated code execution as root
Exploit Prerequisites SSL VPN (webvpn) or AnyConnect SSL VPN enabled
CVSS 3.1 Score 9.0 (Critical)

Cisco recommends using the Cisco Software Checker to identify vulnerable releases and the earliest available patches. Administrators should audit device configurations to verify SSL VPN or HTTP server status.

For ASA/FTD, confirm webvpn or AnyConnect SSL VPN settings. For IOS XR, ensure the command run uname -s returns Linux or disable the HTTP server with no http server. Cisco PSIRT reports no active exploitation currently.

Comments are closed.