Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Patches Critical Vulnerability in Firewall Management Platform

Posted on August 15, 2025August 15, 2025 By CWS

Cisco has revealed greater than 20 safety advisories as a part of its August 2025 bundled publication for Safe Firewall Administration Heart (FMC), Safe Firewall Risk Protection (FTD), and Safe Firewall Adaptive Safety Equipment (ASA) merchandise.

Essentially the most severe vulnerability — based mostly on its severity ranking — is CVE-2025-20265, a important flaw affecting the Safe FMC platform designed for managing and monitoring Cisco FTD home equipment and different safety options.

The weak spot impacts Safe FMC situations which have Radius authentication enabled. It may be exploited by a distant, unauthenticated attacker for arbitrary code execution. 

“This vulnerability is because of a scarcity of correct dealing with of person enter in the course of the authentication part,” Cisco defined. “An attacker might exploit this vulnerability by sending crafted enter when getting into credentials that can be authenticated on the configured RADIUS server. A profitable exploit might enable the attacker to execute instructions at a excessive privilege stage.”

Cisco has additionally addressed greater than a dozen high-severity vulnerabilities in its FMC, FTD and ASA merchandise.

A majority may be exploited by unauthenticated attackers for distant DoS assaults. Others may be exploited for DoS assaults, however solely by authenticated attackers. 

A high-severity FMC subject permits an authenticated, distant attacker to inject arbitrary HTML content material right into a device-generated doc, learn arbitrary recordsdata from the working system, and conduct SSRF assaults. 

Eleven medium-severity vulnerabilities have been addressed by Cisco in its safety merchandise.Commercial. Scroll to proceed studying.

Cisco has launched patches for these vulnerabilities and it additionally supplies a software program checker instrument to assist prospects determine impacted merchandise and the required fixes.

The networking large stated there was no proof that these vulnerabilities have been exploited within the wild. Further particulars can be found in Cisco’s advisories. 

Cisco prospects have been knowledgeable just lately that hackers had began concentrating on important vulnerabilities in Identification Providers Engine (ISE), lower than a month after patches have been launched.

Associated: Cisco Warns of Hardcoded Credentials in Enterprise Software program

Associated: Cisco Says Consumer Information Stolen in CRM Hack

Associated: AI Guardrails Below Hearth: Cisco’s Jailbreak Demo Exposes AI Weak Factors

Security Week News Tags:Cisco, Critical, Firewall, Management, Patches, Platform, Vulnerability

Post navigation

Previous Post: 2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware
Next Post: Top 10 Best Deception Tools in 2025

Related Posts

160,000 Impacted by Wayne Memorial Hospital Data Breach Security Week News
Airport Cyberattack Disrupts More Flights Across Europe Security Week News
US Sanctions Philippine Company for Supporting Crypto Scams Security Week News
Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal Security Week News
Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch Security Week News
Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News