PatchSiren cyber security CVE debrief
CVE-2025-20362 Cisco CVE debrief
CVE-2025-20362 is a Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) missing authorization vulnerability. CISA added it to the Known Exploited Vulnerabilities catalog on 2025-09-25, which indicates known exploitation and makes it an urgent remediation item. For U.S. federal agencies, the KEV due date is 2025-09-26, tied to Emergency Directive 25-03 and the associated Cisco/CISA mitigation guidance.
- Vendor
- Cisco
- Product
- Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2025-09-25
- Original CVE updated
- 2025-09-25
- Advisory published
- 2025-09-25
- Advisory updated
- 2025-09-25
Who should care
Security, infrastructure, and incident-response teams responsible for Cisco Secure Firewall ASA/FTD deployments, especially Internet-facing appliances and remote-access services. Federal civilian agencies should treat this as an immediate compliance and response priority because the item is in CISA KEV.
Technical summary
The supplied corpus identifies the issue as a missing authorization vulnerability in Cisco Secure Firewall ASA and FTD. The source material does not provide CVSS, attack chain details, or reproduction steps, but CISA’s KEV listing confirms the vulnerability is known to be exploited in the wild. The available official references point defenders to Cisco’s advisory and CISA’s ED 25-03 mitigation and hunting instructions.
Defensive priority
Immediate
Recommended defensive actions
- Review Cisco’s official security advisory and apply the vendor’s recommended fixes or mitigations for affected ASA/FTD systems.
- Follow CISA Emergency Directive 25-03 and the linked mitigation instructions without delay.
- Use CISA’s supplemental hunt and core-dump guidance to look for signs of compromise on potentially affected devices.
- Apply the CISA eviction-strategies guidance if compromise is suspected or confirmed.
- If mitigations are not available for a deployment, follow CISA guidance to discontinue use of the product in accordance with applicable policy.
Evidence notes
This debrief is based only on the supplied CISA KEV record and the official links included in the corpus. The corpus confirms the vendor, product family, vulnerability name, KEV date added, due date, and that known ransomware campaign use is listed as unknown. No CVSS score or deeper technical write-up is present in the supplied source material.
Official resources
-
CVE-2025-20362 CVE record
CVE.org
-
CVE-2025-20362 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the m
-
Source item URL
cisa_kev
Publicly disclosed in the supplied timeline on 2025-09-25, with CISA adding the CVE to KEV the same day and setting a due date of 2025-09-26 for federal review and mitigation steps.