Description
A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol processing of Cisco Adaptive Security Appliance (ASA) Software, Cisco Firepower Threat Defense (FTD) Software, Cisco IOS Software, and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation when processing IKEv2 messages. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition on the affected device.
Reserved 2024-10-10 | Published 2025-05-07 | Updated 2025-05-07 | Assigner
ciscoHIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Problem types
Out-of-bounds Write
Product status
Default status
unknown
9.12.3
affected
9.8.3
affected
9.12.1
affected
9.8.1
affected
9.12.2
affected
9.8.2.45
affected
9.8.2
affected
9.8.4
affected
9.14.1
affected
9.12.4
affected
9.8.2.26
affected
9.8.2.24
affected
9.8.2.15
affected
9.8.2.14
affected
9.8.2.35
affected
9.8.2.20
affected
9.8.2.8
affected
9.8.2.17
affected
9.8.2.28
affected
9.8.2.33
affected
9.8.2.38
affected
9.8.4.25
affected
9.12.3.2
affected
9.12.3.7
affected
9.8.3.18
affected
9.8.3.14
affected
9.8.4.15
affected
9.8.4.8
affected
9.8.1.7
affected
9.8.3.29
affected
9.14.1.10
affected
9.12.2.5
affected
9.8.4.22
affected
9.12.3.12
affected
9.8.4.7
affected
9.8.4.17
affected
9.8.3.16
affected
9.8.4.20
affected
9.8.3.11
affected
9.12.1.3
affected
9.8.4.3
affected
9.12.2.4
affected
9.8.4.12
affected
9.12.1.2
affected
9.8.3.26
affected
9.8.1.5
affected
9.12.2.9
affected
9.12.3.9
affected
9.8.3.21
affected
9.8.4.10
affected
9.12.2.1
affected
9.12.4.2
affected
9.14.1.6
affected
9.8.3.8
affected
9.14.1.15
affected
9.14.1.19
affected
9.8.4.26
affected
9.12.4.4
affected
9.14.1.30
affected
9.8.4.29
affected
9.12.4.7
affected
9.14.2
affected
9.12.4.8
affected
9.8.4.32
affected
9.12.4.10
affected
9.14.2.4
affected
9.14.2.8
affected
9.12.4.13
affected
9.8.4.33
affected
9.14.2.13
affected
9.8.4.34
affected
9.12.4.18
affected
9.8.4.35
affected
9.14.2.15
affected
9.12.4.24
affected
9.16.1
affected
9.8.4.39
affected
9.14.3
affected
9.12.4.26
affected
9.16.1.28
affected
9.14.3.1
affected
9.12.4.29
affected
9.14.3.9
affected
9.16.2
affected
9.12.4.30
affected
9.16.2.3
affected
9.8.4.40
affected
9.14.3.11
affected
9.12.4.35
affected
9.8.4.41
affected
9.15.1.1
affected
9.14.3.13
affected
9.16.2.7
affected
9.12.4.37
affected
9.14.3.15
affected
9.17.1
affected
9.16.2.11
affected
9.14.3.18
affected
9.16.2.13
affected
9.12.4.39
affected
9.12.4.38
affected
9.8.4.43
affected
9.14.4
affected
9.16.2.14
affected
9.17.1.7
affected
9.12.4.40
affected
9.16.3.3
affected
9.14.4.6
affected
9.16.3
affected
9.16.3.14
affected
9.17.1.9
affected
9.14.4.7
affected
9.12.4.41
affected
9.17.1.10
affected
9.8.4.44
affected
9.18.1
affected
9.12.4.47
affected
9.14.4.12
affected
9.16.3.15
affected
9.18.1.3
affected
9.17.1.11
affected
9.12.4.48
affected
9.14.4.13
affected
9.18.2
affected
9.16.3.19
affected
9.17.1.13
affected
9.12.4.50
affected
9.14.4.14
affected
9.17.1.15
affected
9.8.4.45
affected
9.12.4.52
affected
9.14.4.15
affected
9.16.3.23
affected
9.18.2.5
affected
9.16.4
affected
9.12.4.54
affected
9.14.4.17
affected
9.8.4.46
affected
9.17.1.20
affected
9.18.2.7
affected
9.19.1
affected
9.16.4.9
affected
9.12.4.55
affected
9.18.2.8
affected
9.14.4.22
affected
9.16.4.14
affected
9.8.4.48
affected
9.18.3
affected
9.19.1.5
affected
9.14.4.23
affected
9.12.4.56
affected
9.16.4.18
affected
9.17.1.30
affected
9.19.1.9
affected
9.18.3.39
affected
9.16.4.19
affected
9.12.4.58
affected
9.19.1.12
affected
9.18.3.46
affected
9.16.4.27
affected
9.19.1.18
affected
9.18.3.53
affected
9.18.3.55
affected
9.16.4.38
affected
9.17.1.33
affected
9.12.4.62
affected
9.16.4.39
affected
9.18.3.56
affected
9.20.1
affected
9.16.4.42
affected
9.19.1.22
affected
9.18.4
affected
9.20.1.5
affected
9.18.4.5
affected
9.19.1.24
affected
9.16.4.48
affected
9.18.4.8
affected
9.20.2
affected
9.19.1.27
affected
9.12.4.65
affected
9.16.4.55
affected
9.18.4.22
affected
9.20.2.10
affected
9.16.4.57
affected
9.19.1.28
affected
9.17.1.39
affected
9.12.4.67
affected
9.14.4.24
affected
9.18.4.24
affected
9.20.2.21
affected
9.16.4.61
affected
9.19.1.31
affected
9.18.4.29
affected
Default status
unknown
6.2.3.14
affected
6.4.0.1
affected
6.2.3.7
affected
6.2.3
affected
6.4.0.2
affected
6.2.3.9
affected
6.2.3.1
affected
6.2.3.2
affected
6.4.0.5
affected
6.2.3.10
affected
6.4.0
affected
6.4.0.3
affected
6.2.3.6
affected
6.4.0.4
affected
6.2.3.15
affected
6.2.3.5
affected
6.2.3.4
affected
6.2.3.3
affected
6.2.3.8
affected
6.4.0.6
affected
6.2.3.11
affected
6.2.3.12
affected
6.2.3.13
affected
6.4.0.7
affected
6.4.0.8
affected
6.6.0
affected
6.4.0.9
affected
6.2.3.16
affected
6.6.0.1
affected
6.6.1
affected
6.4.0.10
affected
6.4.0.11
affected
6.6.3
affected
6.6.4
affected
6.4.0.12
affected
7.0.0
affected
6.2.3.17
affected
7.0.0.1
affected
6.6.5
affected
7.0.1
affected
7.1.0
affected
6.4.0.13
affected
6.6.5.1
affected
6.2.3.18
affected
7.0.1.1
affected
6.4.0.14
affected
7.1.0.1
affected
6.6.5.2
affected
7.0.2
affected
6.4.0.15
affected
7.2.0
affected
7.0.2.1
affected
7.0.3
affected
6.6.7
affected
7.1.0.2
affected
7.2.0.1
affected
7.0.4
affected
7.2.1
affected
7.0.5
affected
6.4.0.16
affected
7.3.0
affected
7.2.2
affected
7.2.3
affected
6.6.7.1
affected
7.3.1
affected
7.1.0.3
affected
7.2.4
affected
7.0.6
affected
7.2.5
affected
7.2.4.1
affected
7.3.1.1
affected
7.4.0
affected
6.4.0.17
affected
7.0.6.1
affected
7.2.5.1
affected
7.4.1
affected
7.2.6
affected
7.0.6.2
affected
7.4.1.1
affected
6.6.7.2
affected
6.4.0.18
affected
7.2.7
affected
7.2.5.2
affected
7.3.1.2
affected
7.2.8
affected
7.2.8.1
affected
References
sec.cloudapps.cisco.com/...o-sa-multiprod-ikev2-dos-gPctUqv2 (cisco-sa-multiprod-ikev2-dos-gPctUqv2)
cve.org (CVE-2025-20182)
nvd.nist.gov (CVE-2025-20182)
Download JSON