We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20182

Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software and IOS XE Software IKEv2 Denial of Service Vulnerability



Description

A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol processing of Cisco Adaptive Security Appliance (ASA) Software, Cisco Firepower Threat Defense (FTD) Software, Cisco IOS Software, and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation when processing IKEv2 messages. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition on the affected device.

Reserved 2024-10-10 | Published 2025-05-07 | Updated 2025-05-07 | Assigner cisco


HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Problem types

Out-of-bounds Write

Product status

Default status
unknown

9.12.3
affected

9.8.3
affected

9.12.1
affected

9.8.1
affected

9.12.2
affected

9.8.2.45
affected

9.8.2
affected

9.8.4
affected

9.14.1
affected

9.12.4
affected

9.8.2.26
affected

9.8.2.24
affected

9.8.2.15
affected

9.8.2.14
affected

9.8.2.35
affected

9.8.2.20
affected

9.8.2.8
affected

9.8.2.17
affected

9.8.2.28
affected

9.8.2.33
affected

9.8.2.38
affected

9.8.4.25
affected

9.12.3.2
affected

9.12.3.7
affected

9.8.3.18
affected

9.8.3.14
affected

9.8.4.15
affected

9.8.4.8
affected

9.8.1.7
affected

9.8.3.29
affected

9.14.1.10
affected

9.12.2.5
affected

9.8.4.22
affected

9.12.3.12
affected

9.8.4.7
affected

9.8.4.17
affected

9.8.3.16
affected

9.8.4.20
affected

9.8.3.11
affected

9.12.1.3
affected

9.8.4.3
affected

9.12.2.4
affected

9.8.4.12
affected

9.12.1.2
affected

9.8.3.26
affected

9.8.1.5
affected

9.12.2.9
affected

9.12.3.9
affected

9.8.3.21
affected

9.8.4.10
affected

9.12.2.1
affected

9.12.4.2
affected

9.14.1.6
affected

9.8.3.8
affected

9.14.1.15
affected

9.14.1.19
affected

9.8.4.26
affected

9.12.4.4
affected

9.14.1.30
affected

9.8.4.29
affected

9.12.4.7
affected

9.14.2
affected

9.12.4.8
affected

9.8.4.32
affected

9.12.4.10
affected

9.14.2.4
affected

9.14.2.8
affected

9.12.4.13
affected

9.8.4.33
affected

9.14.2.13
affected

9.8.4.34
affected

9.12.4.18
affected

9.8.4.35
affected

9.14.2.15
affected

9.12.4.24
affected

9.16.1
affected

9.8.4.39
affected

9.14.3
affected

9.12.4.26
affected

9.16.1.28
affected

9.14.3.1
affected

9.12.4.29
affected

9.14.3.9
affected

9.16.2
affected

9.12.4.30
affected

9.16.2.3
affected

9.8.4.40
affected

9.14.3.11
affected

9.12.4.35
affected

9.8.4.41
affected

9.15.1.1
affected

9.14.3.13
affected

9.16.2.7
affected

9.12.4.37
affected

9.14.3.15
affected

9.17.1
affected

9.16.2.11
affected

9.14.3.18
affected

9.16.2.13
affected

9.12.4.39
affected

9.12.4.38
affected

9.8.4.43
affected

9.14.4
affected

9.16.2.14
affected

9.17.1.7
affected

9.12.4.40
affected

9.16.3.3
affected

9.14.4.6
affected

9.16.3
affected

9.16.3.14
affected

9.17.1.9
affected

9.14.4.7
affected

9.12.4.41
affected

9.17.1.10
affected

9.8.4.44
affected

9.18.1
affected

9.12.4.47
affected

9.14.4.12
affected

9.16.3.15
affected

9.18.1.3
affected

9.17.1.11
affected

9.12.4.48
affected

9.14.4.13
affected

9.18.2
affected

9.16.3.19
affected

9.17.1.13
affected

9.12.4.50
affected

9.14.4.14
affected

9.17.1.15
affected

9.8.4.45
affected

9.12.4.52
affected

9.14.4.15
affected

9.16.3.23
affected

9.18.2.5
affected

9.16.4
affected

9.12.4.54
affected

9.14.4.17
affected

9.8.4.46
affected

9.17.1.20
affected

9.18.2.7
affected

9.19.1
affected

9.16.4.9
affected

9.12.4.55
affected

9.18.2.8
affected

9.14.4.22
affected

9.16.4.14
affected

9.8.4.48
affected

9.18.3
affected

9.19.1.5
affected

9.14.4.23
affected

9.12.4.56
affected

9.16.4.18
affected

9.17.1.30
affected

9.19.1.9
affected

9.18.3.39
affected

9.16.4.19
affected

9.12.4.58
affected

9.19.1.12
affected

9.18.3.46
affected

9.16.4.27
affected

9.19.1.18
affected

9.18.3.53
affected

9.18.3.55
affected

9.16.4.38
affected

9.17.1.33
affected

9.12.4.62
affected

9.16.4.39
affected

9.18.3.56
affected

9.20.1
affected

9.16.4.42
affected

9.19.1.22
affected

9.18.4
affected

9.20.1.5
affected

9.18.4.5
affected

9.19.1.24
affected

9.16.4.48
affected

9.18.4.8
affected

9.20.2
affected

9.19.1.27
affected

9.12.4.65
affected

9.16.4.55
affected

9.18.4.22
affected

9.20.2.10
affected

9.16.4.57
affected

9.19.1.28
affected

9.17.1.39
affected

9.12.4.67
affected

9.14.4.24
affected

9.18.4.24
affected

9.20.2.21
affected

9.16.4.61
affected

9.19.1.31
affected

9.18.4.29
affected

Default status
unknown

6.2.3.14
affected

6.4.0.1
affected

6.2.3.7
affected

6.2.3
affected

6.4.0.2
affected

6.2.3.9
affected

6.2.3.1
affected

6.2.3.2
affected

6.4.0.5
affected

6.2.3.10
affected

6.4.0
affected

6.4.0.3
affected

6.2.3.6
affected

6.4.0.4
affected

6.2.3.15
affected

6.2.3.5
affected

6.2.3.4
affected

6.2.3.3
affected

6.2.3.8
affected

6.4.0.6
affected

6.2.3.11
affected

6.2.3.12
affected

6.2.3.13
affected

6.4.0.7
affected

6.4.0.8
affected

6.6.0
affected

6.4.0.9
affected

6.2.3.16
affected

6.6.0.1
affected

6.6.1
affected

6.4.0.10
affected

6.4.0.11
affected

6.6.3
affected

6.6.4
affected

6.4.0.12
affected

7.0.0
affected

6.2.3.17
affected

7.0.0.1
affected

6.6.5
affected

7.0.1
affected

7.1.0
affected

6.4.0.13
affected

6.6.5.1
affected

6.2.3.18
affected

7.0.1.1
affected

6.4.0.14
affected

7.1.0.1
affected

6.6.5.2
affected

7.0.2
affected

6.4.0.15
affected

7.2.0
affected

7.0.2.1
affected

7.0.3
affected

6.6.7
affected

7.1.0.2
affected

7.2.0.1
affected

7.0.4
affected

7.2.1
affected

7.0.5
affected

6.4.0.16
affected

7.3.0
affected

7.2.2
affected

7.2.3
affected

6.6.7.1
affected

7.3.1
affected

7.1.0.3
affected

7.2.4
affected

7.0.6
affected

7.2.5
affected

7.2.4.1
affected

7.3.1.1
affected

7.4.0
affected

6.4.0.17
affected

7.0.6.1
affected

7.2.5.1
affected

7.4.1
affected

7.2.6
affected

7.0.6.2
affected

7.4.1.1
affected

6.6.7.2
affected

6.4.0.18
affected

7.2.7
affected

7.2.5.2
affected

7.3.1.2
affected

7.2.8
affected

7.2.8.1
affected

References

sec.cloudapps.cisco.com/...o-sa-multiprod-ikev2-dos-gPctUqv2 (cisco-sa-multiprod-ikev2-dos-gPctUqv2)

cve.org (CVE-2025-20182)

nvd.nist.gov (CVE-2025-20182)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-20182

Support options

Helpdesk Chat, Email, Knowledgebase