If you use or manage Cisco AnyConnect VPN, then this article is for you. Cisco security team has detected a critical vulnerability in AnyConnect devices that can lead to DoS attacks by unauthenticated attackers. This vulnerability poses a signified risk to organizations that rely on secure access using Cisco AnyConnect VPN.
About the vulnerability
The vulnerability being tracked as CVE-2025-20271 with a CVSS score of 8.6 is due to errors in variable initialization while SSL VPN sessions are established on affected devices. The vulnerable products include Meraki MX Series: MX 64, MS64W, MX65, MX65W, MX67, MX67C, MX67W, MX68, MX68CW, MX68W, MX75, MX84, MX85, MX95, MX100, MX105, MX250, MX400, MX450, MX600, vMX, Z3, Z3C, Z4 and Z4C. Only the devices that have client certificate authentication enabled are vulnerable.
Threat actors used…
