Cisco Firewalls Under Renewed Assault as New DoS Attack Variant Emerges

Cisco Issues Urgent Warning as New Attack Variant Exploits Critical ASA and FTD Firewall Vulnerabilities

CRITICAL
November 7, 2025
November 11, 2025
6m read
VulnerabilityCyberattackPatch Management

CVE Identifiers

Full Report(when first published)

Executive Summary

On November 5, 2025, Cisco disclosed a new wave of attacks exploiting two known vulnerabilities, CVE-2025-20333 and CVE-2025-20362, in its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) software. This new variant causes a persistent denial-of-service (DoS) condition by forcing unpatched devices into a continuous reload cycle. These vulnerabilities have been actively exploited by advanced threat actors since at least May 2025, leading to full system compromise, malware deployment, and data exfiltration in targeted networks, including a confirmed breach of a U.S. government agency. Despite patches being available since September 2025, many devices remain vulnerable. Cisco, alongside CISA and the UK's NCSC, is urging all customers to patch immediately, as no alternative mitigations are effective.


Threat Overview

The latest attack campaign leverages a new variant to trigger a device reload on unpatched Cisco ASA and Cisco FTD firewalls. The core of the issue lies in CVE-2025-20333, a critical vulnerability resulting from insufficient input validation in the VPN web server. An authenticated attacker can exploit this flaw by sending a specially crafted HTTP/S request to the device, leading to arbitrary code execution with root privileges.

This is not a new threat, but an evolution of an ongoing campaign. Exploitation was first observed in May 2025, prompting patches in September 2025. Following the patch release, CISA and the NCSC issued a joint advisory about active exploitation by an advanced threat actor. These actors have demonstrated sophistication, using their access to deploy malware, exfiltrate data, and cover their tracks by disabling logging and intentionally crashing devices to hinder forensic analysis.

Technical Analysis

The attack chain primarily focuses on exploiting CVE-2025-20333. While authentication is a prerequisite, threat actors can gain it through various means, including credential stuffing, phishing, or exploiting other vulnerabilities.

TTPs (Tactics, Techniques, and Procedures)

Impact Assessment

The impact of this attack is severe. A successful DoS attack on a perimeter firewall can completely sever an organization's internet connectivity, disrupting all external and cloud-based services, remote access for employees, and business-to-business communications. For organizations that have not patched, the risk of full system compromise remains. An attacker with root access to a firewall can pivot into the internal network, intercept traffic, disable security controls, and establish persistent access. The compromise of a US government agency underscores the high-stakes nature of this threat. Recovery from a DoS loop requires manual intervention and patching, leading to significant downtime.

Cyber Observables for Detection

Security teams should proactively hunt for signs of compromise or attempted exploitation:

Type Value Description
url_pattern /+CSCOE+/ or /+CSCOU+/ Monitor web server logs for unusual or malformed requests to VPN-related URLs.
log_source Cisco ASA/FTD Syslog Look for unexpected device reloads, configuration change messages, or gaps in logging.
command_line_pattern show running-config Correlate admin sessions with actual commands executed. Threat actors were known to intercept CLI commands, so discrepancies are a red flag.
process_name lina or snort Monitor for unexpected crashes or restarts of core firewall processes.
network_traffic_pattern Outbound connections from firewall Any outbound connections initiated from the firewall's management interface to unknown IPs should be considered highly suspicious.

Detection & Response

  • Log Analysis: Scrutinize web server, VPN, and system logs on ASA/FTD devices for anomalous HTTP/S requests, especially those targeting the VPN portal. Look for unexpected reboots with no corresponding administrative action. Use a SIEM to correlate login events with subsequent configuration changes or suspicious outbound traffic. D3FEND Technique: D3-NTA: Network Traffic Analysis.
  • Configuration Audits: Regularly audit firewall configurations for any unauthorized changes, particularly focusing on VPN settings, access control lists (ACLs), and user accounts. Compare current configurations against a known-good baseline. D3FEND Technique: D3-SFA: System File Analysis.
  • Integrity Monitoring: Implement file and configuration integrity monitoring on the devices to detect unauthorized modifications to system files or configurations.

Mitigation

CRITICAL: The only effective mitigation is to apply the security patches provided by Cisco. There are no workarounds.

  1. Immediate Patching: Upgrade Cisco ASA software to version 9.18.4.19 or later and FTD software to version 7.4.2 or later. Prioritize internet-facing devices. D3FEND Technique: D3-SU: Software Update.
  2. Restrict Access: Limit access to the firewall's management interface to a dedicated and secured management network. Do not expose the management interface to the internet. D3FEND Technique: D3-NI: Network Isolation.
  3. Network Segmentation: Implement network segmentation to limit the potential blast radius should a perimeter device be compromised. This prevents attackers from easily moving laterally into critical internal zones. D3FEND Technique: D3-BDI: Broadcast Domain Isolation.
  4. Multi-Factor Authentication (MFA): Enforce MFA for all administrative access to network devices, including firewalls, to protect against credential compromise. D3FEND Technique: D3-MFA: Multi-factor Authentication.

Timeline of Events

1
May 1, 2025
Initial exploitation of Cisco ASA/FTD vulnerabilities by an advanced threat actor begins.
2
September 1, 2025
Cisco releases patches for CVE-2025-20333 and CVE-2025-20362.
3
November 5, 2025
Cisco becomes aware of a new attack variant causing a persistent denial-of-service condition.
4
November 7, 2025
This article was published

Article Updates

November 11, 2025

New details link Cisco firewall vulnerabilities to the state-sponsored 'ArcaneDoor' zero-day campaign, with a new DoS variant actively exploited.

MITRE ATT&CK Mitigations

The most critical mitigation is to apply the fixed software releases from Cisco immediately.

Mapped D3FEND Techniques:

Restrict access to the firewall's management interface to a limited set of trusted IP addresses and networks.

Mapped D3FEND Techniques:

Use an IPS to monitor for and block traffic matching signatures of known exploits against these vulnerabilities.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Enable comprehensive logging and forward logs to a centralized SIEM for analysis and alerting on suspicious activity.

Enforce MFA for all administrative access to the firewall to prevent unauthorized logins.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Immediately prioritize the deployment of Cisco ASA software version 9.18.4.19 or later and FTD software version 7.4.2 or later. This is the only definitive way to remediate CVE-2025-20333 and CVE-2025-20362. Focus patching efforts first on internet-facing firewalls, as they are the primary attack vector. Establish a change management process to test the update in a non-production environment if possible, but given the active and severe nature of the exploitation, the risk of delaying the patch likely outweighs the risk of the update itself. Use network scanning tools and asset inventories to confirm that all vulnerable instances have been identified and patched. Verify successful patching by checking the software version via the device's CLI or GUI post-update.

As a compensating control, strictly filter inbound traffic to the firewall's management and VPN interfaces. Create explicit allow-lists for trusted source IP addresses that require administrative access and block all others. This measure, while not a patch, significantly reduces the attack surface by preventing unauthorized users from even reaching the vulnerable web server. This should be applied to both IPv4 and IPv6 traffic. While attackers can sometimes spoof IPs, this control will thwart unsophisticated attempts and force advanced actors to secure a foothold on a trusted network segment first, increasing the difficulty of exploitation. This filtering should be implemented on an upstream network device if possible, providing a layer of defense before traffic reaches the vulnerable ASA/FTD appliance.

Deploy network traffic analysis tools to monitor for indicators of compromise and exploitation attempts against your Cisco firewalls. Specifically, configure rules to alert on malformed HTTP/S requests directed at the VPN web server. Establish a baseline of normal traffic patterns to and from the firewall's management interface and alert on deviations, such as connections from unusual geographic locations, unexpected data volumes, or connections at odd hours. Monitor for any outbound connections initiated from the firewall itself, as this is a strong indicator of compromise. This continuous monitoring can help detect attacks that bypass preventative controls and provides crucial data for incident response.

Sources & References(when first published)

Cisco warns of 'new attack variant' battering firewalls
The Register (theregister.com) November 6, 2025
Cisco Warns of Active Exploitation of ASA and FTD 0-Day Vulnerability
eSecurityPlanet (esecurityplanet.com) November 7, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

FirewallDoSRCEVulnerabilityCiscoPatch Management

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading