Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks

Posted on November 13, 2025November 13, 2025 By CWS

The US cybersecurity company CISA has issued a contemporary warning on addressing two Cisco Safe Firewall Adaptive Safety Equipment (ASA) and Safe Firewall Menace Protection (FTD) vulnerabilities exploited within the China-linked ArcaneDoor espionage marketing campaign.

The 2 bugs, tracked as CVE-2025-20333 and CVE-2025-20362, had been found in Might, after being exploited as zero-days in assaults towards authorities organizations.

As a part of the assaults, the menace actor exploited the issues to deploy malware, execute instructions on susceptible home equipment, and certain exfiltrate knowledge.

Impacting the VPN net server of ASA and FTD software program, the problems enable attackers to ship crafted requests and execute arbitrary code with root privileges, or entry a restricted URL with out authentication.

Cisco patched the 2 safety defects on September 25, and warned on November 6 {that a} new variant of the assault causes gadgets to reload, resulting in denial-of-service (DoS).

On September 25, CISA issued Emergency Directive 25-03 (ED 25-03), urging federal companies to establish inside their environments Cisco gadgets operating susceptible ASA and FTD software program variations and instantly apply the patches.

“CISA is directing companies to account for all Cisco ASA and Firepower gadgets, gather forensics and assess compromise through CISA-provided procedures and instruments, disconnect end-of-support gadgets, and improve gadgets that can stay in service,” ED 25-03 mandates.

Federal companies had been additionally required to report back to CISA by October 2 a whole stock of the recognized gadgets, in addition to on the actions taken. Some companies, nonetheless, didn’t correctly patch their home equipment, the company now says.Commercial. Scroll to proceed studying.

“CISA recognized, by means of evaluation of company reported knowledge, situations of companies marking gadgets as ‘patched’, however which companies up to date to a model of the software program that’s nonetheless susceptible to the menace exercise outlined within the ED,” a November 12 ED 25-03 replace reads.

As a result of some federal companies couldn’t discover the most recent software program iterations for the affected Cisco gadgets, CISA has revealed an inventory of minimal variations that include fixes for each CVE-2025-20333 and CVE-2025-20362, in addition to contemporary steering on addressing the bugs.

“For companies with ASA or Firepower gadgets not but up to date to the required software program variations or gadgets that had been up to date after September 26, 2025, CISA recommends extra actions to mitigate towards ongoing and new menace exercise. CISA urges all companies with ASAs and Firepower gadgets to observe [the] steering,” CISA notes.

Associated: Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Associated: Cisco Patches Vital Vulnerabilities in Contact Heart Equipment

Associated: China’s Cyber Silence Is Extra Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says

Associated: Cisco Routers Hacked for Rootkit Deployment

Security Week News Tags:Attacks, ChinaLinked, CISA, Cisco, Devices, Guidance, Patching, Targeted, Updates

Post navigation

Previous Post: Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting
Next Post: 1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Related Posts

New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions Security Week News
Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage Security Week News
Intel Employee Data Exposed by Vulnerabilities Security Week News
Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up Security Week News
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Security Week News
HPE Patches Critical Vulnerability in StoreOnce Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it
  • Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts
  • FortiWeb Authentication Bypass Vulnerability Exploited
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it
  • Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts
  • FortiWeb Authentication Bypass Vulnerability Exploited
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News