Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive

Posted on September 25, 2025September 25, 2025 By CWS

Sep 25, 2025Ravie LakshmananZero-Day / Vulnerability
Cisco is urging prospects to patch two safety flaws impacting the VPN net server of Cisco Safe Firewall Adaptive Safety Equipment (ASA) Software program and Cisco Safe Firewall Menace Protection (FTD) Software program, which it stated have been exploited within the wild.
The zero-day vulnerabilities in query are listed under –

CVE-2025-20333 (CVSS rating: 9.9) – An improper validation of user-supplied enter in HTTP(S) requests vulnerability that would permit an authenticated, distant attacker with legitimate VPN consumer credentials to execute arbitrary code as root on an affected system by sending crafted HTTP requests
CVE-2025-20362 (CVSS rating: 6.5) – An improper validation of user-supplied enter in HTTP(S) requests vulnerability that would permit an unauthenticated, distant attacker to entry restricted URL endpoints with out authentication by sending crafted HTTP requests

Cisco stated it is conscious of “tried exploitation” of each vulnerabilities, however didn’t reveal who could also be behind it, or how widespread the assaults are. It is suspected that the 2 vulnerabilities are being chained to bypass authentication and execute malicious code on prone home equipment.

It additionally credited the Australian Indicators Directorate, Australian Cyber Safety Centre (ACSC), Canadian Centre for Cyber Safety, U.Okay. Nationwide Cyber Safety Centre (NCSC), and U.S. Cybersecurity and Infrastructure Safety Company (CISA) for supporting the investigation.
CISA Points Emergency Directive ED 25-03
In a separate alert, CISA stated it is issuing an emergency directive urging federal businesses to determine, analyze, and mitigate potential compromises with quick impact. As well as, each vulnerabilities have been added to the Identified Exploited Vulnerabilities (KEV) catalog, giving the businesses 24 hours to use the required mitigations.
“CISA is conscious of an ongoing exploitation marketing campaign by a sophisticated risk actor focusing on Cisco Adaptive Safety Home equipment (ASA),” the company famous.
“The marketing campaign is widespread and includes exploiting zero-day vulnerabilities to realize unauthenticated distant code execution on ASAs, in addition to manipulating read-only reminiscence (ROM) to persist via reboot and system improve. This exercise presents a big danger to sufferer networks.”
The company additionally famous that the exercise is linked to a risk cluster dubbed ArcaneDoor, which was beforehand recognized as focusing on perimeter community units from a number of distributors, together with Cisco, to ship malware households like Line Runner and Line Dancer. The exercise was attributed to a risk actor dubbed UAT4356 (aka Storm-1849).
“This risk actor has demonstrated a functionality to efficiently modify ASA ROM a minimum of as early as 2024,” CISA added. “These zero-day vulnerabilities within the Cisco ASA platform are additionally current in particular variations of Cisco Firepower. Firepower home equipment’ Safe Boot would detect the recognized manipulation of the ROM.”

The Hacker News Tags:ASA, Attack, CISA, Cisco, Directive, Duo, Emergency, Mitigation, Triggers, ZeroDay

Post navigation

Previous Post: Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network
Next Post: Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk

Related Posts

Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets The Hacker News
Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware The Hacker News
Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The Hacker News
Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans The Hacker News
U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions The Hacker News
Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News