CISA has issued an urgent update to its implementation guidance for Emergency Directive 25-03, originally released in September 2025. The directive addresses two critical, actively exploited vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Firepower devices: CVE-2025-20333 (RCE, CVSS 9.9) and CVE-2025-20362 (Privilege Escalation, CVSS 6.5). Despite the initial warning, threat actors, including the China-linked group Storm-1849 (also known as ArcaneDoor), continue to exploit these flaws. CISA's new guidance, released on November 12, warns that many organizations failed to apply the correct software versions, leaving their edge devices vulnerable. The update provides clear instructions for corrective patching and additional steps for potentially compromised devices.
The continued exploitation of these Cisco vulnerabilities highlights a persistent challenge in cybersecurity: the gap between patch availability and successful patch deployment. The two vulnerabilities, when chained, allow a remote attacker to execute arbitrary code and gain full control of a device. Nation-state actors like Storm-1849 are particularly interested in these flaws, as compromising edge devices like the Cisco ASA provides a strategic foothold for long-term persistence, espionage, and reconnaissance within target networks.
CISA's investigation found that many federal agencies and other organizations believed they were protected after applying updates, but had not installed the minimum required software versions specified by Cisco, thus remaining vulnerable. This gap in compliance has allowed attackers to continue their campaigns unabated.
CVE-2025-20333 - Cisco ASA and FTD Software Remote Code Execution Vulnerability (KEV)
CVE-2025-20362 - Cisco ASA and FTD Software Privilege Escalation Vulnerability (KEV)
root level.The new guidance from November 12 provides several key directives:
RayDetect scanner tool to analyze Cisco ASA core dumps for signs of compromise, specifically looking for implants or modifications associated with the Storm-1849 threat actor.The failure to correctly patch these critical vulnerabilities leaves organizations, including federal agencies, exposed to espionage and network intrusion by sophisticated state-sponsored actors. A compromised network security appliance is a catastrophic failure, as it can be used to bypass all other network defenses, monitor traffic, and serve as a persistent beachhead for deeper attacks. The focus on these edge devices by groups like Storm-1849 underscores their value as primary targets for intelligence gathering.
RayDetect Scanner: All organizations with Cisco ASA devices should use CISA's RayDetect tool to scan core dumps for evidence of compromise. This is a critical step, especially for devices not patched by the original deadline.Ensure the specific, correct software versions from Cisco are installed to fully mitigate the vulnerabilities.
Mapped D3FEND Techniques:
Use tools like CISA's RayDetect and perform regular audits to hunt for signs of compromise on critical edge devices.
Mapped D3FEND Techniques:
Restrict access to device management interfaces from the internet.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats