Source: The Hacker News
Author: The Hacker News
URL: https://thehackernews.com/2025/09/urgent-cisco-asa-zero-day-duo-under.html
ONE SENTENCE SUMMARY:
Cisco urges immediate patching of critical zero-day vulnerabilities in VPN software, exploited by threat actors to execute remote attacks.
MAIN POINTS:
- Cisco warns of two zero-day flaws in ASA and FTD software.
- CVE-2025-20333 allows authenticated attackers to execute arbitrary code as root.
- CVE-2025-20362 enables unauthorized access to restricted URLs.
- Both vulnerabilities are being actively exploited in the wild.
- Potential exploitation may involve chaining both flaws for authentication bypass.
- The flaws are linked to the ArcaneDoor threat cluster and UAT4356 actor.
- CISA issues emergency directive for immediate mitigation efforts.
- The vulnerabilities are included in the Known Exploited Vulnerabilities catalog.
- The attacks include persistent memory manipulation across reboots and upgrades.
- Firepower appliances with Secure Boot can detect ROM manipulation attempts.
TAKEAWAYS:
- Immediate patching of VPN software is essential to prevent remote code execution.
- Awareness of ArcaneDoor’s campaign is crucial for network defense strategies.
- Rapid response following CISA’s directive can mitigate potential threats.
- Understanding the vulnerabilities aids in recognizing threat actor tactics.
- Monitoring Firepower systems’ Secure Boot can help detect ROM attacks.