Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco ASA 0-Day RCE Vulnerability Actively Exploited in the Wild

Posted on September 26, 2025September 26, 2025 By CWS

Cisco has issued an emergency safety advisory warning of energetic exploitation of a important zero-day vulnerability in its Safe Firewall Adaptive Safety Equipment (ASA) and Safe Firewall Risk Protection (FTD) software program platforms. 

The vulnerability, tracked as CVE-2025-20333, carries a most CVSS rating of 9.9 and permits authenticated distant attackers to execute arbitrary code with root privileges on affected gadgets.

The vulnerability resides within the VPN internet server part of each ASA and FTD software program, particularly affecting gadgets with distant entry VPN configurations enabled.

 Cisco’s Product Safety Incident Response Crew (PSIRT) confirmed energetic exploitation makes an attempt and emphasised the important nature of this safety flaw, which might end in full system compromise.

Cisco ASA 0-Day RCE Vulnerability

The foundation reason behind CVE-2025-20333 lies in improper validation of user-supplied enter inside HTTP(S) requests processed by the VPN internet server. 

This buffer overflow vulnerability (CWE-120) permits authenticated attackers with legitimate VPN credentials to craft malicious HTTP requests that set off code execution with elevated privileges.

Weak configurations embody gadgets working ASA or FTD software program with particular VPN options enabled, together with AnyConnect IKEv2 Distant Entry with consumer companies (crypto ikev2 allow client-services port ), SSL VPN companies (webvpn allow ), and Cellular Person Safety (MUS) implementations. 

The vulnerability particularly targets SSL pay attention sockets enabled by these configurations.

The exploitation course of requires attackers to first acquire legitimate VPN consumer credentials, after which they’ll ship specifically crafted HTTP requests to the focused system’s VPN internet server. 

Profitable exploitation grants root-level entry, probably permitting risk actors to put in persistent backdoors, exfiltrate delicate community visitors, or pivot to inner community segments.

The invention and investigation of this vulnerability concerned unprecedented collaboration between a number of worldwide cybersecurity companies, together with the Australian Indicators Directorate, the Australian Cyber Safety Centre, the Canadian Centre for Cyber Safety, the UK Nationwide Cyber Safety Centre (NCSC), and the U.S. Cybersecurity & Infrastructure Safety Company (CISA).

This coordinated response suggests refined risk actor involvement, probably nation-state or superior persistent risk (APT) teams focusing on important infrastructure.

Unauthorized Entry Vulnerability (CVE-2025-20362)

CVE-2025-20362 is an unauthenticated unauthorized entry vulnerability within the VPN internet server of Cisco Safe Firewall Adaptive Safety Equipment (ASA) and Safe Firewall Risk Protection (FTD) software program. 

Rated Medium severity with a CVSS 3.1 base rating of 6.5, this flaw permits distant attackers to bypass authentication and entry restricted URL endpoints.

The vulnerability stems from improper validation of user-supplied enter in HTTP(S) requests dealt with by the VPN internet server. Particularly, sure URL endpoints that ought to require authentication fail to implement entry checks. 

An attacker crafts a malicious HTTP request focusing on these endpoints and may retrieve or work together with delicate sources with none legitimate VPN credentials.

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-20333Cisco Safe Firewall ASA/FTD VPN Net Server Distant Code Execution Vulnerability9.9CriticalCVE-2025-20362Cisco Safe Firewall ASA/FTD VPN Net Server Unauthorized Entry Vulnerability6.5Medium

Mitigations 

Cisco emphasizes that no workarounds exist for vulnerabilities, making instant software program updates the one viable remediation technique. 

Organizations ought to prioritize patching all affected ASA and FTD gadgets utilizing Cisco’s Software program Checker software to determine weak releases and applicable fastened variations.

The advisory particularly recommends reviewing risk detection configurations for VPN companies utilizing the command present running-config to determine weak configurations. Community directors ought to implement enhanced monitoring for uncommon VPN authentication patterns and HTTP request anomalies focusing on SSL VPN endpoints.

Given the energetic exploitation standing and most severity ranking, safety groups ought to deal with this vulnerability as a important incident requiring emergency patching procedures. 

Organizations unable to right away patch ought to take into account quickly disabling weak VPN configurations if operationally possible, although Cisco notes this method could affect enterprise continuity for distant entry necessities.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Actively, ASA, Cisco, Exploited, RCE, Vulnerability, Wild

Post navigation

Previous Post: Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware
Next Post: Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks

Related Posts

Cisco Nexus Dashboard Fabric Controller Vulnerability Allows Attackers Device Impersonate as Managed Devices Cyber Security News
New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News
Microsoft Investigating Teams and Exchange Online Services Disruption Impacting Users Cyber Security News
Microsoft Investigating Forms Service Issue Not Accessible for Users Cyber Security News
Google Vulnerability Let Attackers Access Any Google User Phone Number Cyber Security News
Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News