This week highlights multiple critical Cisco vulnerabilities (CVE-2025-20363, CVE-2025-20333, CVE-2025-20362). This flaw stems from improper input validation in HTTP(S) requests. An authenticated VPN user could send crafted requests to execute code as root, potentially compromising the device. The initial two rules were made available on September 28, with a third rule added today, October 7, for more robust protection.
- Cisco (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363): Multiple vulnerabilities that could allow attackers to exploit unsafe deserialization and input validation flaws. Successful exploitation may result in arbitrary code execution, privilege escalation, or command injection on affected systems.
Impact
Cisco (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363): Exploitation enables attackers to escalate privileges or achieve remote code execution via command injection. Administrators are strongly advised to apply vendor updates immediately.
| Ruleset | Rule ID | Legacy Rule ID | Description | Previous Action | New Action | Comments |
|---|---|---|---|---|---|---|
| Cloudflare Managed Ruleset | 12f808a5315441688f3b7c8a3a4d1bd6 | 100788B | Cisco Secure Firewall Adaptive Security Appliance – Remote Code Execution – CVE:CVE-2025-20333, CVE:CVE-2025-20362, CVE:CVE-2025-20363 | N/A | Block | This is a New Detection |
Source: Cloudflare
Latest Posts
- AWS Control Tower is now available in AWS Asia Pacific (New Zealand) Region

- Amazon EC2 High Memory U7i instances are now available in AWS Europe (London) Region

- Web Grounding: Build accurate AI applications with Amazon Nova models

- Gateway – New Application Categories added for HTTP Traffic Management






![(Updated) Microsoft Purview: IRM RBAC Change (related to Data Security Investigations) Preview [MC1041756] 7 (Updated) Microsoft Purview: IRM RBAC Change (related to Data Security Investigations) Preview [MC1041756]](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-ken-tomita-127057-389818-96x96.webp)