Home

Description

A vulnerability in the Geolocation-Based Remote Access (RA) VPN feature of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies to allow or deny HTTP connections based on a country or region. This vulnerability exists because the URL string is not fully parsed. An attacker could exploit this vulnerability by sending a crafted HTTP connection through the targeted device. A successful exploit could allow the attacker to bypass configured policies and gain access to a network where the connection should have been denied.

PUBLISHED Reserved 2024-10-10 | Published 2025-08-14 | Updated 2025-08-14 | Assigner cisco




MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

Problem types

Improper Handling of Values

Product status

Default status
unknown

7.7.0
affected

References

sec.cloudapps.cisco.com/...o-sa-ftd-ravpn-geobypass-9h38M37Z (cisco-sa-ftd-ravpn-geobypass-9h38M37Z)

cve.org (CVE-2025-20268)

nvd.nist.gov (CVE-2025-20268)

Download JSON