<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2025-20182 ASA, FTD and Cisco IOS Software, and Cisco IOS IKEv2 Denial of Service Vulnerability in Threats</title>
    <link>https://community.isc2.org/t5/Threats/CVE-2025-20182-ASA-FTD-and-Cisco-IOS-Software-and-Cisco-IOS/m-p/80092#M1639</link>
    <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol processing of Cisco Adaptive Security Appliance (ASA) Software, Cisco Firepower Threat Defense (FTD) Software, Cisco IOS Software, and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;This vulnerability is due to insufficient input validation when processing IKEv2 messages. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition on the affected device.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multiprod-ikev2-dos-gPctUqv2" target="_blank" rel="noopener"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multiprod-ikev2-dos-gPctUqv2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 09 May 2025 11:21:02 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2025-05-09T11:21:02Z</dc:date>
    <item>
      <title>CVE-2025-20182 ASA, FTD and Cisco IOS Software, and Cisco IOS IKEv2 Denial of Service Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/CVE-2025-20182-ASA-FTD-and-Cisco-IOS-Software-and-Cisco-IOS/m-p/80092#M1639</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol processing of Cisco Adaptive Security Appliance (ASA) Software, Cisco Firepower Threat Defense (FTD) Software, Cisco IOS Software, and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;This vulnerability is due to insufficient input validation when processing IKEv2 messages. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition on the affected device.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multiprod-ikev2-dos-gPctUqv2" target="_blank" rel="noopener"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multiprod-ikev2-dos-gPctUqv2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2025 11:21:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CVE-2025-20182-ASA-FTD-and-Cisco-IOS-Software-and-Cisco-IOS/m-p/80092#M1639</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2025-05-09T11:21:02Z</dc:date>
    </item>
  </channel>
</rss>

