Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices

CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices

Posted on November 13, 2025November 13, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has issued a essential alert relating to federal businesses.

Failing to correctly patch Cisco Adaptive Safety Home equipment (ASA) and Firepower Menace Protection (FTD) gadgets in opposition to actively exploited vulnerabilities.

Below Emergency Directive 25-03, CISA has recognized two extreme CVEs posing unacceptable dangers to federal data methods:

CVE-2025-20333, which allows distant code execution, and CVE-2025-20362, which permits privilege escalation.

Patch Standing on Crucial Cisco Gadgets

Energetic exploitation of those vulnerabilities has been detected throughout federal civilian govt department (FCEB) businesses.

The first concern stems from a essential discovery throughout CISA’s evaluation of company compliance studies.

CVE IDVulnerability TypeImpactCVE-2025-20333Remote Code ExecutionAllows unauthenticated attackers to execute arbitrary codeCVE-2025-20362Privilege EscalationAllows authenticated attackers to escalate privileges

Quite a few gadgets marked as “patched” in official reporting templates had been discovered operating outdated software program variations that stay weak to energetic threats.

This distinction signifies that businesses misunderstood patch necessities or deployed incomplete updates.

CISA emphasizes that businesses should replace ALL ASA and Firepower gadgets to the minimal required software program variations, not simply public-facing tools.

Susceptible software program trains embody ASA variations 9.12 by way of 9.22 and Firepower variations 7.0 by way of 7.6, every requiring particular minimal patch ranges.

For ASA gadgets, the minimal required variations are: 9.12.4.72, 9.14.4.28, 9.16.4.85, 9.18.4.67, 9.20.4.10, and 9.22.2.14. ASA variations 9.17 and 9.19 require migration to supported releases.

Firepower gadgets should run at the least 7.0.8.1, 7.2.10.2, 7.4.2.4, or 7.6.2.1, relying on their present launch prepare. Emergency Directive 25-03 mandates patch deployment inside 48 hours of launch.

Companies working public-facing ASA {hardware} should execute CISA’s Core Dump and Hunt procedures and submit findings through the Malware Subsequent Gen portal earlier than patching.

Non-compliant businesses should resubmit ED 25-03 compliance studies by way of CyberScope. CISA will straight contact recognized non-compliant businesses to make sure corrective actions are accomplished instantly.

This enforcement motion underscores the essential significance of complete patching methods throughout all gadget classes inside federal networks.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actively, Agencies, ASA, CISA, Cisco, Devices, Exploited, Federal, Firepower, Fully, Patching, Warns

Post navigation

Previous Post: New Phishing Attack Targeting iPhone Owners Who’ve Lost Their Devices
Next Post: CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

Related Posts

The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel Cyber Security News
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code 7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack Cyber Security News
CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks Cyber Security News
TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature Cyber Security News
Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News