Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks

CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks

Posted on November 13, 2025November 13, 2025 By CWS

The US cybersecurity company CISA has issued a contemporary warning on addressing two Cisco Safe Firewall Adaptive Safety Equipment (ASA) and Safe Firewall Menace Protection (FTD) vulnerabilities exploited within the China-linked ArcaneDoor espionage marketing campaign.

The 2 bugs, tracked as CVE-2025-20333 and CVE-2025-20362, had been found in Might, after being exploited as zero-days in assaults towards authorities organizations.

As a part of the assaults, the menace actor exploited the issues to deploy malware, execute instructions on susceptible home equipment, and certain exfiltrate knowledge.

Impacting the VPN net server of ASA and FTD software program, the problems enable attackers to ship crafted requests and execute arbitrary code with root privileges, or entry a restricted URL with out authentication.

Cisco patched the 2 safety defects on September 25, and warned on November 6 {that a} new variant of the assault causes gadgets to reload, resulting in denial-of-service (DoS).

On September 25, CISA issued Emergency Directive 25-03 (ED 25-03), urging federal companies to establish inside their environments Cisco gadgets operating susceptible ASA and FTD software program variations and instantly apply the patches.

“CISA is directing companies to account for all Cisco ASA and Firepower gadgets, gather forensics and assess compromise through CISA-provided procedures and instruments, disconnect end-of-support gadgets, and improve gadgets that can stay in service,” ED 25-03 mandates.

Federal companies had been additionally required to report back to CISA by October 2 a whole stock of the recognized gadgets, in addition to on the actions taken. Some companies, nonetheless, didn’t correctly patch their home equipment, the company now says.Commercial. Scroll to proceed studying.

“CISA recognized, by means of evaluation of company reported knowledge, situations of companies marking gadgets as ‘patched’, however which companies up to date to a model of the software program that’s nonetheless susceptible to the menace exercise outlined within the ED,” a November 12 ED 25-03 replace reads.

As a result of some federal companies couldn’t discover the most recent software program iterations for the affected Cisco gadgets, CISA has revealed an inventory of minimal variations that include fixes for each CVE-2025-20333 and CVE-2025-20362, in addition to contemporary steering on addressing the bugs.

“For companies with ASA or Firepower gadgets not but up to date to the required software program variations or gadgets that had been up to date after September 26, 2025, CISA recommends extra actions to mitigate towards ongoing and new menace exercise. CISA urges all companies with ASAs and Firepower gadgets to observe [the] steering,” CISA notes.

Associated: Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Associated: Cisco Patches Vital Vulnerabilities in Contact Heart Equipment

Associated: China’s Cyber Silence Is Extra Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says

Associated: Cisco Routers Hacked for Rootkit Deployment

Security Week News Tags:Attacks, ChinaLinked, CISA, Cisco, Devices, Guidance, Patching, Targeted, Updates

Post navigation

Previous Post: Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting
Next Post: 1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Related Posts

Fortinet, Ivanti, Nvidia Release Security Updates Fortinet, Ivanti, Nvidia Release Security Updates Security Week News
Cyber Intelligence Firm iCOUNTER Emerges From Stealth With  Million in Funding Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding Security Week News
CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry Security Week News
US, Allies Push for SBOMs to Bolster Cybersecurity US, Allies Push for SBOMs to Bolster Cybersecurity Security Week News
Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft Security Week News
Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News