Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

Posted on September 26, 2025September 26, 2025 By CWS

The U.Ok. Nationwide Cyber Safety Centre (NCSC) has revealed that risk actors have exploited the not too long ago disclosed safety flaws impacting Cisco firewalls as a part of zero-day assaults to ship beforehand undocumented malware households like RayInitiator and LINE VIPER.
“The RayInitiator and LINE VIPER malware characterize a major evolution on that used within the earlier marketing campaign, each in sophistication and its potential to evade detection,” the company mentioned.
Cisco on Thursday revealed that it started investigating assaults on a number of authorities companies linked to the state-sponsored marketing campaign in Might 2025 that focused Adaptive Safety Equipment (ASA) 5500-X Collection units to implant malware, execute instructions, and probably exfiltrate information from the compromised units.
An in-depth evaluation of firmware extracted from the contaminated units working Cisco Safe Firewall ASA Software program with VPN internet providers enabled in the end led to the invention of a reminiscence corruption bug within the product software program, it added.
“Attackers have been noticed to have exploited a number of zero-day vulnerabilities and employed superior evasion methods comparable to disabling logging, intercepting CLI instructions, and deliberately crashing units to forestall diagnostic evaluation,” the corporate mentioned.

The exercise entails the exploitation of CVE-2025-20362 (CVSS rating: 6.5) and CVE-2025-20333 (CVSS rating: 9.9) to bypass authentication and execute malicious code on prone home equipment. The marketing campaign is assessed to be linked to a risk cluster dubbed ArcaneDoor, which was attributed to a suspected China-linked hacking group generally known as UAT4356 (aka Storm-1849).
Moreover, in some instances, the risk actor is alleged to have modified ROMMON (brief for Learn-Solely Reminiscence Monitor) – which is answerable for managing the boot course of and performing diagnostic assessments in ASA units – to facilitate persistence throughout reboots and software program upgrades. That being mentioned, these modifications have been detected solely on Cisco ASA 5500-X Collection platforms that lack Safe Boot and Belief Anchor applied sciences.

Cisco additionally mentioned the marketing campaign has efficiently compromised ASA 5500-X Collection fashions working Cisco ASA Software program releases 9.12 or 9.14 with VPN internet providers enabled, and which don’t assist Safe Boot and Belief Anchor applied sciences. All of the affected units have reached end-of-support (EoS) or are about to succeed in EoS standing by subsequent week –

5512-X and 5515-X – Final Date of Assist: August 31, 2022
5585-X – Final Date of Assist: Might 31, 2023
5525-X, 5545-X, and 5555-X – Final Date of Assist: September 30, 2025

Moreover, the corporate famous that it has addressed a 3rd crucial flaw (CVE-2025-20363, CVSS rating: 8.5/9.0) within the internet providers of Adaptive Safety Equipment (ASA) Software program, Safe Firewall Menace Protection (FTD) Software program, IOS Software program, IOS XE Software program, and IOS XR Software program that might enable an distant attacker to execute arbitrary code on an affected system.
“An attacker might exploit this vulnerability by sending crafted HTTP requests to a focused internet service on an affected system after acquiring extra details about the system, overcoming exploit mitigations, or each,” it mentioned. “A profitable exploit might enable the attacker to execute arbitrary code as root, which can result in the entire compromise of the affected system.”
In contrast to CVE-2025-20362 and CVE-2025-20333, there is no such thing as a proof that the vulnerability has been exploited within the wild in a malicious context. Cisco mentioned the shortcoming was found by the Cisco Superior Safety Initiatives Group (ASIG) through the decision of a Cisco TAC assist case.
The Canadian Centre for Cyber Safety has urged organizations within the nation to take motion as quickly as potential to counter the risk by updating to a hard and fast model of Cisco ASA and FTD merchandise.
The U.Ok. NCSC, in an advisory launched September 25, revealed the assaults have leveraged a multi-stage bootkit known as RayInitiator to deploy a user-mode shellcode loader generally known as LINE VIPER to the ASA equipment.

RayInitiator is a persistent GRand Unified Bootloader (GRUB) bootkit that is flashed to sufferer units, whereas able to surviving reboots and firmware upgrades. It is answerable for loading into reminiscence LINE VIPER, which may run CLI instructions, carry out packet captures, bypass VPN Authentication, Authorization, and Accounting (AAA) for actor units, suppress syslog messages, harvest consumer CLI instructions, and power a delayed reboot.
The bootkit accomplishes this by putting in a handler inside a respectable ASA binary known as “lina” to execute LINE VIPER. Lina, brief for Linux-based Built-in Community Structure, is the working system software program that integrates core firewall functionalities of the ASA.
Described as “extra complete” than Line Dancer, LINE VIPER makes use of two strategies for communication with the command-and-control (C2) server: WebVPN consumer authentication classes over HTTPS, or through ICMP with responses over uncooked TCP. It is also designed to make various modifications to “lina” to keep away from leaving a forensic path and forestall detection of modifications to CLI instructions like copy and confirm.
“The deployment of LINE VIPER through a persistent bootkit, mixed with a larger emphasis on defence evasion methods, demonstrates a rise in actor sophistication and enchancment in operational safety in comparison with the ArcaneDoor marketing campaign publicly documented in 2024,” the NCSC mentioned.

The Hacker News Tags:ASA, Cisco, Deploy, Exploits, Firewall, Line, Malware, RayInitiator, Viper, ZeroDay

Post navigation

Previous Post: RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor
Next Post: Cisco ASA 0-Day RCE Vulnerability Actively Exploited in the Wild

Related Posts

Secure Vibe Coding: The Complete New Guide The Hacker News
Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs The Hacker News
Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants The Hacker News
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News