Cisco confirms active exploitation of three zero-days by advanced threat actors

Cisco confirmed on September 26 a sophisticated attack campaign against ASA 5500-X series devices since May 2025. Three zero-day vulnerabilities are being exploited: CVE-2025-20333 (CVSS 9.9) for remote code execution on the web VPN server, CVE-2025-20362 (CVSS 6.5) for unauthorized access to the web VPN server, and CVE-2025-20363 (CVSS 9.0) affecting IOS, IOS XE and IOS XR via HTTP server. CVE-2025-20352 (CVSS 7.7) in the SNMP subsystem also continues to be exploited. The case demands immediate action from those involved.

The same threat actor behind the 2024 ArcaneDoor operation demonstrates advanced capabilities, including modification of ROMMON for persistence through reboots and software updates. The attacks target Cisco ASA 5500-X series devices running versions 9.12 or 9.14 with web VPN services enabled. Only models without Secure Boot support were compromised: 5512-X, 5515-X, 5525-X, 5545-X, 5555-X and 5585-X.

Recommendations:

  • Immediately inventory all Cisco ASA platforms (ASA hardware, ASA-Service Module, ASA Virtual and ASA firmware on Firepower 2100/4100/9300) and all Cisco Firepower Threat Defense appliances according to ED 25-03 directive methodology.
  • For all internet-facing ASA hardware appliances, execute CISA’s Core Dump and Hunt Parts 1-3 step-by-step instructions and submit core dumps via Malware Next Gen portal by September 26, 2025, 11:59 PM EDT (more information at link: https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cis…).
  • Permanently disconnect end-of-support ASA hardware devices on or before September 30, 2025.
  • Apply latest Cisco updates by September 26, 2025 and subsequent ones within 48 hours.
  • For devices that cannot be immediately updated, disable all SSL/TLS VPN services, including IKEv2 client services that facilitate software updates and endpoint client profiles, and all SSL VPN services.
  • Report complete inventory by October 2, 2025 using CISA template.
  • For suspected or confirmed compromised devices, perform complete reset to factory configurations after updating to patched version, replacing all configurations — especially local passwords, certificates and keys — with newly generated credentials

 

SEK maintains active monitoring of this campaign and is prepared to provide specialized support in incident response, forensic analysis and implementation of compensatory security controls. Our team can assist in identifying compromised devices, safely executing recovery procedures and implementing security architectures resilient against advanced persistent threats.

 

More content like this:

Red Hat confirms exposition of customer data following cyberattack on GitLab instance

On October 2nd of this year, Red Hat confirmed a security breach in a GitLab Community Edition instance used by the Red Hat Consulting team.

Coordinated Salesforce attacks affect hundreds of organizations globally​

The FBI warned of attacks exploiting Salesforce to steal data and OAuth tokens from major companies.

Privacy Overview
SEK

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Additional Cookies

This website uses the following additional cookies:

(List the cookies that you are using on the website here.)