On November 5, 2025, Cisco disclosed a new wave of attacks exploiting two known vulnerabilities, CVE-2025-20333 and CVE-2025-20362, in its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) software. This new variant causes a persistent denial-of-service (DoS) condition by forcing unpatched devices into a continuous reload cycle. These vulnerabilities have been actively exploited by advanced threat actors since at least May 2025, leading to full system compromise, malware deployment, and data exfiltration in targeted networks, including a confirmed breach of a U.S. government agency. Despite patches being available since September 2025, many devices remain vulnerable. Cisco, alongside CISA and the UK's NCSC, is urging all customers to patch immediately, as no alternative mitigations are effective.
The latest attack campaign leverages a new variant to trigger a device reload on unpatched Cisco ASA and Cisco FTD firewalls. The core of the issue lies in CVE-2025-20333, a critical vulnerability resulting from insufficient input validation in the VPN web server. An authenticated attacker can exploit this flaw by sending a specially crafted HTTP/S request to the device, leading to arbitrary code execution with root privileges.
This is not a new threat, but an evolution of an ongoing campaign. Exploitation was first observed in May 2025, prompting patches in September 2025. Following the patch release, CISA and the NCSC issued a joint advisory about active exploitation by an advanced threat actor. These actors have demonstrated sophistication, using their access to deploy malware, exfiltrate data, and cover their tracks by disabling logging and intentionally crashing devices to hinder forensic analysis.
The attack chain primarily focuses on exploiting CVE-2025-20333. While authentication is a prerequisite, threat actors can gain it through various means, including credential stuffing, phishing, or exploiting other vulnerabilities.
T1190 - Exploit Public-Facing Application: The attackers target the web-based management interface and VPN functionalities of the Cisco firewalls, which are by nature internet-facing.T1203 - Exploitation for Client Execution: The crafted HTTP/S request triggers the vulnerability, leading to code execution on the underlying operating system.T1068 - Exploitation for Privilege Escalation: The vulnerability allows the attacker to gain root-level privileges, granting complete control over the device.T1562.001 - Disable or Modify Tools: Threat actors were observed disabling logging mechanisms to hide their activity. T1070.001 - Clear Windows Event Logs (or equivalent on the appliance) is a related technique. They also intercepted CLI commands to evade detection by administrators.T1499 - Endpoint Denial of Service: The new attack variant specifically causes the device to reload repeatedly, resulting in a persistent DoS condition. The original attacks also involved T1486 - Data Encrypted for Impact and T1565.001 - Data Transfer Size Limits for exfiltration.The impact of this attack is severe. A successful DoS attack on a perimeter firewall can completely sever an organization's internet connectivity, disrupting all external and cloud-based services, remote access for employees, and business-to-business communications. For organizations that have not patched, the risk of full system compromise remains. An attacker with root access to a firewall can pivot into the internal network, intercept traffic, disable security controls, and establish persistent access. The compromise of a US government agency underscores the high-stakes nature of this threat. Recovery from a DoS loop requires manual intervention and patching, leading to significant downtime.
Security teams should proactively hunt for signs of compromise or attempted exploitation:
| Type | Value | Description |
|---|---|---|
url_pattern |
/+CSCOE+/ or /+CSCOU+/ |
Monitor web server logs for unusual or malformed requests to VPN-related URLs. |
log_source |
Cisco ASA/FTD Syslog |
Look for unexpected device reloads, configuration change messages, or gaps in logging. |
command_line_pattern |
show running-config |
Correlate admin sessions with actual commands executed. Threat actors were known to intercept CLI commands, so discrepancies are a red flag. |
process_name |
lina or snort |
Monitor for unexpected crashes or restarts of core firewall processes. |
network_traffic_pattern |
Outbound connections from firewall |
Any outbound connections initiated from the firewall's management interface to unknown IPs should be considered highly suspicious. |
D3-NTA: Network Traffic Analysis.D3-SFA: System File Analysis.CRITICAL: The only effective mitigation is to apply the security patches provided by Cisco. There are no workarounds.
D3-SU: Software Update.D3-NI: Network Isolation.D3-BDI: Broadcast Domain Isolation.D3-MFA: Multi-factor Authentication.New details link Cisco firewall vulnerabilities to the state-sponsored 'ArcaneDoor' zero-day campaign, with a new DoS variant actively exploited.
The most critical mitigation is to apply the fixed software releases from Cisco immediately.
Mapped D3FEND Techniques:
Restrict access to the firewall's management interface to a limited set of trusted IP addresses and networks.
Mapped D3FEND Techniques:
Use an IPS to monitor for and block traffic matching signatures of known exploits against these vulnerabilities.
Enable comprehensive logging and forward logs to a centralized SIEM for analysis and alerting on suspicious activity.
Enforce MFA for all administrative access to the firewall to prevent unauthorized logins.
Mapped D3FEND Techniques:
Immediately prioritize the deployment of Cisco ASA software version 9.18.4.19 or later and FTD software version 7.4.2 or later. This is the only definitive way to remediate CVE-2025-20333 and CVE-2025-20362. Focus patching efforts first on internet-facing firewalls, as they are the primary attack vector. Establish a change management process to test the update in a non-production environment if possible, but given the active and severe nature of the exploitation, the risk of delaying the patch likely outweighs the risk of the update itself. Use network scanning tools and asset inventories to confirm that all vulnerable instances have been identified and patched. Verify successful patching by checking the software version via the device's CLI or GUI post-update.
As a compensating control, strictly filter inbound traffic to the firewall's management and VPN interfaces. Create explicit allow-lists for trusted source IP addresses that require administrative access and block all others. This measure, while not a patch, significantly reduces the attack surface by preventing unauthorized users from even reaching the vulnerable web server. This should be applied to both IPv4 and IPv6 traffic. While attackers can sometimes spoof IPs, this control will thwart unsophisticated attempts and force advanced actors to secure a foothold on a trusted network segment first, increasing the difficulty of exploitation. This filtering should be implemented on an upstream network device if possible, providing a layer of defense before traffic reaches the vulnerable ASA/FTD appliance.
Deploy network traffic analysis tools to monitor for indicators of compromise and exploitation attempts against your Cisco firewalls. Specifically, configure rules to alert on malformed HTTP/S requests directed at the VPN web server. Establish a baseline of normal traffic patterns to and from the firewall's management interface and alert on deviations, such as connections from unusual geographic locations, unexpected data volumes, or connections at odd hours. Monitor for any outbound connections initiated from the firewall itself, as this is a strong indicator of compromise. This continuous monitoring can help detect attacks that bypass preventative controls and provides crucial data for incident response.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats