Adaptive Security Appliance Software

by Cisco

Standard maintenance is sufficient

Adaptive Security Appliance Software has low exploitation rates. Attackers rarely target this software's known vulnerabilities.

What to do
  1. Keep automatic updates enabled
  2. No urgent action needed
  3. Review periodically as part of normal maintenance

What Attackers Target

Vulnerabilities with high exploit probability 9.7%
Confirmed actively exploited (CISA) 7.4%
Public exploit code available 1.1%
Based on 175 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.

Most Dangerous Vulnerabilities

CVE CVSS Exploit Probability Confirmed
CVE-2020-3452 7.5 94.5% Yes
CVE-2018-0296 7.5 94.4% Yes
CVE-2020-3187 9.1 94.3%
CVE-2020-3580 6.1 93.4% Yes
CVE-2018-0101 10.0 92.8%
CVE-2016-6366 8.8 91.4% Yes
CVE-2016-1287 9.8 89.8%
CVE-2020-3259 7.5 69.7% Yes
CVE-2014-2120 6.1 63.9% Yes
CVE-2025-20362 6.5 46.9% Yes
CVE-2024-20353 8.6 24.4% Yes
CVE-2016-6367 7.8 23.1% Yes
CVE-2015-6360 7.5 18.5%
CVE-2017-3807 8.8 17.2%
CVE-2022-20759 8.8 13.4%
CVE-2024-20481 5.8 11.1% Yes
CVE-2025-20333 9.9 10.6% Yes
CVE-2022-20866 7.4 8.9%
CVE-2025-20363 9.0 5.7%
CVE-2019-15992 7.2 5.0%
19
/ 100
low-risk
Active Threat 12/50 · Low
Exploit Availability 7/50 · Minimal

Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.