# N/A
## 概述
Cisco Secure Firewall ASA 和 FTD 软件的 VPN Web 服务器中存在一个漏洞,允许未经身份验证的远程攻击者访问本应受保护的 URL 端点,无需认证。
## 影响版本
未明确列出具体版本,但涉及 Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 与 Cisco Secure Firewall Threat Defense (FTD) Software。
## 细节
该漏洞是由于对用户提交的 HTTP(S) 请求输入未进行正确验证,攻击者可通过向目标服务器发送特制的 HTTP 请求进行利用。
## 影响
成功利用此漏洞后,攻击者可在无需认证的情况下访问受限的 URL 资源,造成敏感信息泄露或其他进一步攻击。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-20362.yaml | POC详情 |
标题: Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability -- 🔗来源链接
标签:
神龙速读暂无评论