Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild

Posted on October 1, 2025October 1, 2025 By CWS

A crucial zero-day vulnerability affecting hundreds of Cisco firewalls is being actively exploited by menace actors within the wild. 

The vulnerability, tracked as CVE-2025-20333, poses an instantaneous threat to organizations worldwide with a CVSS rating of 9.9, representing one of the crucial extreme safety flaws found in enterprise firewall infrastructure this yr.

In accordance with knowledge from The Shadowserver Basis, over 48,800 unpatched IP addresses have been recognized on September 29, 2025, with america having acquired probably the most publicity. 

The vulnerability impacts Cisco Safe Firewall Adaptive Safety Equipment (ASA) Software program and Cisco Safe Firewall Risk Protection (FTD) Software program, particularly concentrating on the VPN net server part that thousands and thousands of organizations depend on for distant entry capabilities.

Cisco firewalls susceptible

Buffer Overflow Vulnerability (CVE-2025-20333)

The vulnerability stems from improper validation of user-supplied enter in HTTP(S) requests processed by the VPN net server. 

Categorized as a CWE-120 buffer overflow, the flaw permits authenticated distant attackers to execute arbitrary code with root privileges on affected units. 

This stage of entry primarily grants full management over the firewall, enabling attackers to change safety insurance policies, intercept community site visitors, and set up persistent backdoors.

The assault vector requires legitimate VPN person credentials, which attackers can get hold of by way of varied strategies together with credential stuffing, phishing campaigns, or exploiting weak authentication mechanisms. 

As soon as authenticated, attackers can ship specifically crafted HTTP requests containing malicious payloads that overflow reminiscence buffers, permitting shellcode execution within the context of the foundation person.

Cisco’s Product Safety Incident Response Workforce (PSIRT) has confirmed lively exploitation makes an attempt and warns that profitable assaults might lead to full machine compromise. 

The vulnerability impacts units operating susceptible releases of ASA or FTD software program with particular configurations enabled, together with AnyConnect IKEv2 Distant Entry, Cell Person Safety (MUS), and SSL VPN providers.

The affected configurations embody crucial enterprise options that organizations rely on for safe distant entry. Weak configurations embody:

AnyConnect IKEv2 Distant Entry with shopper providers enabled

Cell Person Safety (MUS) implementations

SSL VPN deployments

These configurations are commonplace in enterprise environments, notably these supporting distant workforce initiatives. 

The vulnerability’s severity is compounded by the truth that Cisco has confirmed no workarounds exist to mitigate the danger with out making use of safety patches.

Lacking Authorization Flaw (CVE-2025-20362)

A secondary vulnerability, CVE-2025-20362 (CVSS 6.5), accompanies the first flaw and permits unauthenticated attackers to entry restricted VPN endpoints that ought to require authentication. 

This unauthorized entry vulnerability, labeled as CWE-862 (Lacking Authorization), can function a reconnaissance software for attackers planning extra refined assaults.

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-20333VPN Net Server Distant Code Execution Vulnerability9.9CriticalCVE-2025-20362VPN Net Server Unauthorized Entry Vulnerability6.5Medium

Cisco has launched emergency safety updates addressing each vulnerabilities and strongly recommends fast patching. 

Organizations ought to prioritize these updates given the lively exploitation and the crucial nature of affected programs. 

The corporate additionally advises reviewing menace detection configurations for VPN providers to reinforce safety in opposition to authentication assaults and unauthorized connection makes an attempt.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Actively, Cisco, Exploited, Firewalls, Vulnerability, Vulnerable, Wild

Post navigation

Previous Post: Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
Next Post: Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device

Related Posts

Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News
Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors  Cyber Security News
Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins Cyber Security News
Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Cyber Security News
BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability Cyber Security News
Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News