Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign

UK to build first floating offshore wind farm in Celtic Sea

Los Alamos neutron detector improves accuracy in extreme radiation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive
Identity

Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive

By September 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 25, 2025Ravi LakshmananZero Day/Vulnerability

Cisco urges customers to patch two security flaws that affect the VPN web servers of the Cisco Secure Firewall Adaptive Security Appliance (ASA) software and Cisco Secure Firewall Threat Defense (FTD) software.

The zero-day vulnerabilities in question are listed below –

CVE-2025-20333 (CVSS score: 9.9) – Inappropriate validation of user-supported input on HTTP requires a vulnerability that allows an authenticated remote attacker with valid VPN user credentials to execute arbitrary code as root as root by requesting cve-2025-20362 for CVE-2025-20362. Inappropriate validation of user-supported input over HTTP requests a vulnerability that allows an uncreated remote attacker to send created HTTP requests to access restricted URL endpoints without authentication.

Cisco said it recognizes “attempts to exploit both vulnerabilities, but did not reveal who is behind it or how widespread the attacks are. Two vulnerabilities are suspected to be chained to bypass authentication and run malicious code on sensitive appliances.

DFIR Retainer Service

They also evaluated the Australian Signals Bureau, the Australian Cybersecurity Centre (ACSC), the Canada Cybersecurity Centre, the UK National Cybersecurity Centre (NCSC), and the US Cybersecurity and Infrastructure Security Agency (CISA) as supporting the investigation.

CISA issues emergency directive ED 25-03

In another alert, CISA said it is issuing emergency directives urging federal agencies to immediately and effectively identify, analyze and mitigate potential compromises. Additionally, both vulnerabilities have been added to the Known Exploited Vulnerabilities (KEV) catalog and are given to agents 24 hours a day to apply the necessary mitigations.

“CISA recognizes the ongoing exploitation campaigns by advanced threat actors targeting Cisco Adaptive Security Appliances (ASAs),” the agency said.

“This campaign is widely popular and leverages zero-day vulnerabilities to acquire remote code execution that is not certified on the ASA, and manipulates read-only memory (ROM) to maintain reboots and system upgrades. This activity poses a significant risk to the victim network.”

Agents have also previously identified as providing malware families such as Line Runner and Line Dancer, as activities are linked to threat clusters called Arcanedoors and have previously been identified as target peripheral network devices from several vendors, including Cisco. This activity was attributed to a threat actor called UAT4356 (aka Storm-1849).

“This threat actor demonstrates his ability to successfully change ASA ROMs, at least as early as 2024,” CISA added. “These zero-day vulnerabilities in the Cisco ASA platform also exist in certain versions of Cisco Firepower. The safe boots of firepower detect the identified operations of the ROM.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA million-year-old skull from China holds cues of Neanderthals, Denisovans and human origin
Next Article The startup founder says Trump’s $100,000 H-1B fee is a “talent tariff” that hurts innovation

Related Posts

Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign

March 31, 2026

Axios supply chain attack pushes cross-platform RAT via compromised npm account

March 31, 2026

OpenAI fixes ChatGPT data extraction flaw and Codex GitHub token vulnerability

March 30, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign

UK to build first floating offshore wind farm in Celtic Sea

Los Alamos neutron detector improves accuracy in extreme radiation

PFAS chemicals linked to facial development defects in babies

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.