Home

Description

A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper parsing of SSL/TLS certificates. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static Network Address Translation (NAT) rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

PUBLISHED Reserved 2024-10-10 | Published 2025-08-14 | Updated 2025-08-19 | Assigner cisco




HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Problem types

Double Free

Product status

Default status
unknown

9.12.4.39
affected

9.12.4.40
affected

9.14.4.6
affected

9.14.4.7
affected

9.12.4.41
affected

9.12.4.47
affected

9.14.4.12
affected

9.12.4.48
affected

9.14.4.13
affected

9.12.4.50
affected

9.14.4.14
affected

9.12.4.52
affected

9.14.4.15
affected

9.12.4.54
affected

9.14.4.17
affected

9.12.4.55
affected

9.14.4.22
affected

9.14.4.23
affected

9.12.4.56
affected

9.12.4.58
affected

9.12.4.62
affected

9.12.4.65
affected

9.12.4.67
affected

9.14.4.24
affected

Default status
unknown

6.6.5.2
affected

6.4.0.15
affected

6.6.7
affected

6.4.0.16
affected

6.6.7.1
affected

6.4.0.17
affected

6.6.7.2
affected

6.4.0.18
affected

References

sec.cloudapps.cisco.com/...sco-sa-asaftd-ssltls-dos-eHw76vZe (cisco-sa-asaftd-ssltls-dos-eHw76vZe)

cve.org (CVE-2025-20134)

nvd.nist.gov (CVE-2025-20134)

Download JSON