Cyber Security News

Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass – PoC Released

Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) software, which is reportedly being used in highly targeted attacks by an unknown threat actor.

According to Rapid7, the exploit chain combines two vulnerabilities, CVE-2025-20362 and CVE-2025-20333, to achieve unauthenticated remote code execution (RCE) on vulnerable devices.

A third vulnerability, CVE-2025-20363, was also patched, but evidence suggests only the first two are actively used in the attack chain.

The core of the issue lies within the clientless VPN (WebVPN) feature, allowing an attacker to bypass authentication and then trigger a memory corruption flaw.

The Two-Stage Exploit Chain

The attack begins with CVE-2025-20362, an authentication bypass vulnerability caused by a path traversal flaw. This vulnerability allows an unauthenticated, remote attacker to access restricted URL endpoints that should normally require authentication.

The flaw is a variant of a previously discovered vulnerability, CVE-2018-0296. Attackers can exploit this by sending a specially crafted HTTP request, such as CSCOU...CSCOE, to the device’s web server.

This bypasses security checks and grants access to authenticated endpoints, setting the stage for the second part of the attack. A successful bypass can be identified if the server responds with “CSRF token mismatch” or “Failed to upload file”.

Once authentication is bypassed, the attacker leverages CVE-2025-20333, a buffer overflow vulnerability within the WebVPN feature’s file upload handling process.

This flaw, classified as CWE-120 (Buffer Copy without Checking Size of Input), is located in a Lua script that processes file uploads. Specifically, the script fails to validate the size of the “boundary” value in an HTTP request.

By sending a request with a boundary string larger than the allocated 8192-byte buffer, an attacker can overflow it by calling the HTTPCONTENTTOBUFFER function with a length greater than the buffer’s capacity.

This memory corruption can be triggered via the CSCOEfilesfileaction.html endpoint, which becomes accessible due to the initial authentication bypass, according to Rapid7 analysis.

Mitigations

The successful chaining of these two vulnerabilities results in unauthenticated RCE, giving an attacker complete control over an affected Cisco firewall.

The exploit is non-trivial but has been confirmed to be active in the wild, leading to system crashes and reboots on vulnerable devices. The vulnerability is due to improper validation of user-supplied input in HTTP(S) requests.

Both Cisco ASA and FTD software are affected when the clientless VPN (WebVPN) portal is enabled. Cisco has released patched software versions, including ASAv version 9.16.4.85, to address these critical vulnerabilities.

Administrators are strongly urged to update their systems immediately to prevent potential exploitation.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    Guru Baran

    Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

    Recent Posts

    Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware

    Microsoft has issued a warning that both cybercriminals and state-sponsored threat actors are increasingly abusing…

    1 hour ago

    Why Threat Prioritization Is the Key SOC Performance Driver

    CISOs face a paradox in their SOCs every day: more data and detections than ever…

    1 hour ago

    BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data

    BK Technologies Corporation, a provider of communications equipment for public safety and government agencies, has…

    2 hours ago

    INE Security Releases Industry Benchmark Report: “Wired Together: The Case for Cross-Training in Networking and Cybersecurity”

    Raleigh, United States, October 7th, 2025, CyberNewsWire Report Shows Cross-Training as Strategic Solution to Operational…

    3 hours ago

    Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses

    Ransomware operators have shifted from opportunistic malware distribution to highly targeted campaigns that exploit legitimate…

    4 hours ago

    New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors

    A novel and alarming cybersecurity threat has emerged, turning an ordinary computer peripheral into a…

    5 hours ago