Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Cisco | Cisco Secure Firewall Adaptive Security Appliance (ASA) Software | 9.8.1 | - | |
| Cisco | Cisco Secure Firewall Threat Defense (FTD) Software | 6.2.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-20362.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-20333 | 9.9 CRITICAL | Cisco Secure Firewall Adaptive Security Appliance和Cisco Secure Firewall Threat Defense 安全漏 |
| CVE-2025-20363 | 9.0 CRITICAL | Cisco多款产品 安全漏洞 |
No comments yet