SB2025081512 - Multiple vulnerabilities in Cisco Secure Firewall Management Center (FMC) and Firepower Threat Defense (FTD)
Published: August 15, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper Handling of Values (CVE-ID: CVE-2025-20268)
The vulnerability allows a remote attacker to bypass configured policies on the system.
The vulnerability exists due to the URL string is not fully parsed in the Geolocation-Based Remote Access (RA) VPN feature. A remote attacker can send a specially crafted HTTP connection to bypass configured policies and gain access to a network where the connection should have been denied.
2) Infinite loop (CVE-ID: CVE-2025-20217)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in the packet inspection functionality of the Snort 3 Detection Engine. A remote attacker can consume all available system resources and cause denial of service conditions.
3) OS Command Injection (CVE-ID: CVE-2025-20220)
The vulnerability allows a local user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the CLI. A local administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ravpn-geobypass-9h38M37Z
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-ftd-cmdinj-PhE7kmT