Security patches: Cisco closes attack points in firewalls

Attackers can target Cisco firewalls and take them out of service via DoS attacks, among other things.

listen Print view
Cisco many patches

(Image: Michael Vi/Shutterstock.com)

4 min. read

The network equipment supplier Cisco is closing various vulnerabilities in its firewalls and associated software with security updates. After successful attacks on the leaks, attackers can completely compromise devices in the worst-case scenario. Even if there are currently no reports of ongoing attacks, admins should not delay patching for too long.

The most dangerous vulnerability is a “critical” vulnerability (CVE-2025-20265) with the highest score (CVSS score 10 out of 10). It affects the Secure Firewall Management Center. According to the warning, the vulnerability can be found in the way the RADIUS authentication standard is implemented. However, according to Cisco, systems are only vulnerable if RADIUS and/or SSH management are active for the web management interface.

Because user input is not sufficiently checked during authentication, attackers can use certain requests to exploit the vulnerability and, following a successful attack, execute commands with high user rights. Due to the critical classification and the central role of a management solution, it can be assumed that attackers can compromise networks in this way.

Customers with a support contract should receive the security update automatically. Those who have not booked such an option must provide some information in the warning message to receive the patch.

Videos by heise

Many other vulnerabilities are classified with a “high” threat level. In most cases, attackers can cause DoS states, which triggers crashes (e.g., CVE-2025-20222). Admins can find further information on the vulnerabilities and security updates in the alerts linked below this message.

List sorted by threat level in descending order:

In July, Cisco had to adapt security reports on critical vulnerabilities in the Cisco Identity Services Engine. Although updates for the critical security leaks were available, they were also attacked on the Internet shortly after they became known.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.