SB2025061846 - Remote denial of service in Cisco Meraki MX and Z Series AnyConnect VPN



SB2025061846 - Remote denial of service in Cisco Meraki MX and Z Series AnyConnect VPN

Published: June 18, 2025

Security Bulletin ID SB2025061846
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use of Uninitialized Variable (CVE-ID: CVE-2025-20271)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to use of an uninitialized variable when an SSL VPN session is established in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices. A remote non-authenticated attacker can send a sequence of crafted HTTPS requests to an affected device and force remote clients to initiate a new VPN connection and re-authenticate, resulting in a denial of service condition. 

Successful exploitation of the vulnerability requires use of client certificate authentication.


Remediation

Install update from vendor's website.