Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks

Posted on November 13, 2025November 13, 2025 By CWS

The US cybersecurity company CISA has issued a contemporary warning on addressing two Cisco Safe Firewall Adaptive Safety Equipment (ASA) and Safe Firewall Menace Protection (FTD) vulnerabilities exploited within the China-linked ArcaneDoor espionage marketing campaign.

The 2 bugs, tracked as CVE-2025-20333 and CVE-2025-20362, had been found in Might, after being exploited as zero-days in assaults towards authorities organizations.

As a part of the assaults, the menace actor exploited the issues to deploy malware, execute instructions on susceptible home equipment, and certain exfiltrate knowledge.

Impacting the VPN net server of ASA and FTD software program, the problems enable attackers to ship crafted requests and execute arbitrary code with root privileges, or entry a restricted URL with out authentication.

Cisco patched the 2 safety defects on September 25, and warned on November 6 {that a} new variant of the assault causes gadgets to reload, resulting in denial-of-service (DoS).

On September 25, CISA issued Emergency Directive 25-03 (ED 25-03), urging federal companies to establish inside their environments Cisco gadgets operating susceptible ASA and FTD software program variations and instantly apply the patches.

“CISA is directing companies to account for all Cisco ASA and Firepower gadgets, gather forensics and assess compromise through CISA-provided procedures and instruments, disconnect end-of-support gadgets, and improve gadgets that can stay in service,” ED 25-03 mandates.

Federal companies had been additionally required to report back to CISA by October 2 a whole stock of the recognized gadgets, in addition to on the actions taken. Some companies, nonetheless, didn’t correctly patch their home equipment, the company now says.Commercial. Scroll to proceed studying.

“CISA recognized, by means of evaluation of company reported knowledge, situations of companies marking gadgets as ‘patched’, however which companies up to date to a model of the software program that’s nonetheless susceptible to the menace exercise outlined within the ED,” a November 12 ED 25-03 replace reads.

As a result of some federal companies couldn’t discover the most recent software program iterations for the affected Cisco gadgets, CISA has revealed an inventory of minimal variations that include fixes for each CVE-2025-20333 and CVE-2025-20362, in addition to contemporary steering on addressing the bugs.

“For companies with ASA or Firepower gadgets not but up to date to the required software program variations or gadgets that had been up to date after September 26, 2025, CISA recommends extra actions to mitigate towards ongoing and new menace exercise. CISA urges all companies with ASAs and Firepower gadgets to observe [the] steering,” CISA notes.

Associated: Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Associated: Cisco Patches Vital Vulnerabilities in Contact Heart Equipment

Associated: China’s Cyber Silence Is Extra Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says

Associated: Cisco Routers Hacked for Rootkit Deployment

Security Week News Tags:Attacks, ChinaLinked, CISA, Cisco, Devices, Guidance, Patching, Targeted, Updates

Post navigation

Previous Post: Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting
Next Post: 1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Related Posts

Chrome Update Patches Fifth Zero-Day of 2025 Security Week News
Elastic Refutes Claims of Zero-Day in EDR Product Security Week News
In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak Security Week News
‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks Security Week News
Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks Security Week News
Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign
  • Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  
  • New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware
  • Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it
  • Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign
  • Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  
  • New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware
  • Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it
  • Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News