A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.
https://www.theregister.com/2025/09/26/cisco_firewall_flaws/
https://www.securityweek.com/cisco-firewall-zero-days-exploited-in-china-linked-arcanedoor-attacks/
https://www.infosecurity-magazine.com/news/arcanedoor-attacks-against-cisco/
https://www.helpnetsecurity.com/2025/09/26/cisco-asa-zero-day-attacks/
https://unit42.paloaltonetworks.com/zero-day-vulnerabilities-affect-cisco-software/
https://thehackernews.com/2025/09/cisco-asa-firewall-zero-day-exploits.html
https://therecord.media/cisco-asa-firewall-bugs-cisa-federal-agencies-warning
https://thehackernews.com/2025/09/urgent-cisco-asa-zero-day-duo-under.html
https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
https://cyberscoop.com/cisa-emergency-directive-cisco-zero-days/
Published: 2025-09-25
Updated: 2025-09-26
Base Score: 6.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
Severity: Medium
Base Score: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Severity: Medium
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest