CrowdSec
8/10CrowdSec Score

Cisco Adaptive Security Appliance (ASA) Software - Authentication Bypass (CVE-2025-20362)

142Exploiting IPs reported

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.

CrowdSec analysis

CVE-2025-20362 is a vulnerability in the VPN web server of Cisco ASA and Firepower Threat Defense Software that allows unauthenticated, remote attackers to access restricted VPN-related URL endpoints. By exploiting improper validation of user input in HTTP(S) requests, attackers can bypass authentication controls and gain unauthorized access to sensitive resources, potentially exposing confidential information or enabling further attacks.

CrowdSec has been tracking this vulnerability and its exploits since 15th of October 2025.

Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2025-20362 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-20362 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Attackers exploit this vulnerability by sending crafted requests to URLs containing /+CSCOU+//../+CSCOE+/files/file_action.html, targeting restricted VPN web server endpoints on Cisco ASA and FTD devices to bypass authentication.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.