Vulnerability

Vulnerabilities in Cisco Secure Firewall ASA and FTD actively exploited

Cisco released security updates for vulnerabilities in Cisco Secure Firewall ASA and FTD. The vulnerabilities CVE-2025-20333 - CVSS (v3) 9.9, CVE-2025-20363 - CVSS (v3) 9.0 and CVE-2025-20362 - CVSS (v3) 6.5 are currently being actively exploited on unpatched systems.

Clip path group@2x

T-Update

Information about vulnerabilities

This live blog contains information about vulnerabilities in Cisco Secure Firewall ASA and FTD. Cisco has released security updates to address this vulnerability.

The following CVEs are affected:
CVE-2025-20333 – Remote CodeExecution (CVSS 9.9)
CVE-2025-20362 – UnauthorizedAccess (CVSS 6.5)
CVE-2025-20363 – Remote CodeExecution (CVSS 9.8)


Active exploitation

Cisco and the NCSC confirm that attempted exploits have been observed. Although no public exploit is yet available, the NCSC expects one to be released shortly, increasing the risk of large-scale attacks. Our analysis shows that the vulnerabilities are currently being actively exploited and are linked to malware.

Our analysis shows that the vulnerabilities are currently being actively exploited and are linked to malware.

Last updated on September 26, 2025.

Customized cyber security

Background

Cisco has fixed multiple vulnerabilities in the Cisco Secure Firewall Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Software. These vulnerabilities are located in the VPN Web Server component and could allow attackers to access sensitive system components without authentication or even execute arbitrary code with root privileges. The vulnerabilities are caused by insufficient validation of user input in HTTPS requests. In some cases, only a VPN account is required to exploit the vulnerability. The T-SOC is closely monitoring the situation.

Risk

Analysis shows that CVE-2025-20333 and CVE-2025-20362 are being exploited in conjunction with each other. CVE-2025-20362 serves as a gateway or steppingstone after which CVE-2025-20333 is then exploited.
A successful attack could lead to:
· Full compromise of the device
· Access to restricted URLs without authentication
· Disabling of security measures

The vulnerabilities CVE-2025-20333 and CVE-2025-20362 are reportedly being exploited by a sophisticated, nation-state actor: UAT4356, also known as STORM-1849. This actor was previously identified in the ArcaneDoor campaign targeting network perimeter equipment such as firewalls and VPN devices, with a specific focus on Cisco ASA and FTD.

Characteristics of this actor:
· In-depth knowledge of Cisco equipment
· Use of anti-forensic techniques to avoid detection
· Persistence - malware remains active after reboot or firmware updates
· Use of custom backdoors - Line Runner and Line Dancer - for configuration modification, network reconnaissance, data theft, and lateral movement

This combination of technical expertise and stealth makes the exploitation particularly risky for organizations with sensitive networks or critical infrastructure

Advice

· Update immediately to a patched version of Cisco ASA or FTD Software.
· Check for Indicators of Compromise (IoC) as published by Cisco.
· Restrict access to VPN web interfaces to trusted networks.
· Actively monitor for anomalous behavior and unauthorized access attempts.

Ellipse 6

Sign up to receive T-Updates

Receive the latest vulnerabilities in your email every Wednesday

More than 1,000 organisations have already joined us.

Tesorion gebruikt jouw gegevens voor het versturen van de gevraagde informatie. Daarnaast worden je gegevens mogelijk gebruikt voor commerciële opvolging. Je kunt je op elk gewenst moment hiervoor afmelden via de link in de e-mail. Lees voor meer informatie ons privacybeleid.

Ellipse 6