Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices

Posted on November 13, 2025November 13, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has issued a essential alert relating to federal businesses.

Failing to correctly patch Cisco Adaptive Safety Home equipment (ASA) and Firepower Menace Protection (FTD) gadgets in opposition to actively exploited vulnerabilities.

Below Emergency Directive 25-03, CISA has recognized two extreme CVEs posing unacceptable dangers to federal data methods:

CVE-2025-20333, which allows distant code execution, and CVE-2025-20362, which permits privilege escalation.

Patch Standing on Crucial Cisco Gadgets

Energetic exploitation of those vulnerabilities has been detected throughout federal civilian govt department (FCEB) businesses.

The first concern stems from a essential discovery throughout CISA’s evaluation of company compliance studies.

CVE IDVulnerability TypeImpactCVE-2025-20333Remote Code ExecutionAllows unauthenticated attackers to execute arbitrary codeCVE-2025-20362Privilege EscalationAllows authenticated attackers to escalate privileges

Quite a few gadgets marked as “patched” in official reporting templates had been discovered operating outdated software program variations that stay weak to energetic threats.

This distinction signifies that businesses misunderstood patch necessities or deployed incomplete updates.

CISA emphasizes that businesses should replace ALL ASA and Firepower gadgets to the minimal required software program variations, not simply public-facing tools.

Susceptible software program trains embody ASA variations 9.12 by way of 9.22 and Firepower variations 7.0 by way of 7.6, every requiring particular minimal patch ranges.

For ASA gadgets, the minimal required variations are: 9.12.4.72, 9.14.4.28, 9.16.4.85, 9.18.4.67, 9.20.4.10, and 9.22.2.14. ASA variations 9.17 and 9.19 require migration to supported releases.

Firepower gadgets should run at the least 7.0.8.1, 7.2.10.2, 7.4.2.4, or 7.6.2.1, relying on their present launch prepare. Emergency Directive 25-03 mandates patch deployment inside 48 hours of launch.

Companies working public-facing ASA {hardware} should execute CISA’s Core Dump and Hunt procedures and submit findings through the Malware Subsequent Gen portal earlier than patching.

Non-compliant businesses should resubmit ED 25-03 compliance studies by way of CyberScope. CISA will straight contact recognized non-compliant businesses to make sure corrective actions are accomplished instantly.

This enforcement motion underscores the essential significance of complete patching methods throughout all gadget classes inside federal networks.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actively, Agencies, ASA, CISA, Cisco, Devices, Exploited, Federal, Firepower, Fully, Patching, Warns

Post navigation

Previous Post: New Phishing Attack Targeting iPhone Owners Who’ve Lost Their Devices
Next Post: CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

Related Posts

Gunra Ransomware New Linux Variant Runs Up To 100 Encryption Threads With New Partial Encryption Feature Cyber Security News
Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Cyber Security News
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News
INE Expands Cross-Skilling Innovations Cyber Security News
Behavioral Monitoring for Real-Time Endpoint Threat Detection Cyber Security News
Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers
  • New Vulnerabilities in Bluetooth Headphones Let Hackers Hijack Connected Smartphone
  • Hacktivist Proxy Operations Emerge as a Repeatable Model of Geopolitical Cyber Pressure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers
  • New Vulnerabilities in Bluetooth Headphones Let Hackers Hijack Connected Smartphone
  • Hacktivist Proxy Operations Emerge as a Repeatable Model of Geopolitical Cyber Pressure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark