CrowdSec
5/10CrowdSec Score

Cisco Adaptive Security Appliance (ASA) Software - Authentication Bypass (CVE-2025-20362)

236Exploiting IPs reported

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.

CrowdSec analysis

CVE-2025-20362 is a vulnerability in the VPN web server of Cisco ASA and Firepower Threat Defense Software that allows unauthenticated, remote attackers to access restricted VPN-related URL endpoints. By exploiting improper validation of user input in HTTP(S) requests, attackers can bypass authentication controls and gain unauthorized access to sensitive resources, potentially exposing confidential information or enabling further attacks.

CrowdSec has been tracking this vulnerability and its exploits since 15th of October 2025.

According to CrowdSec data, while opportunistic exploitation dominates, a portion of threat actors trying to exploit CVE-2025-20362 apply basic targeting methods such as port or service detection. This indicates emerging patterns of selective targeting. In addition, according to the CrowdSec network, attack volume against CVE-2025-20362 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.

Attackers exploit this vulnerability by sending crafted requests to URLs containing /+CSCOU+//../+CSCOE+/files/file_action.html, targeting restricted VPN web server endpoints on Cisco ASA and FTD devices to bypass authentication.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.