Source: BleepingComputer
Author: Sergiu Gatlan
URL: https://www.bleepingcomputer.com/news/security/cisco-actively-exploited-firewall-flaws-now-abused-for-dos-attacks/
ONE SENTENCE SUMMARY:
Cisco has released updates to address vulnerabilities in ASA and FTD firewalls being exploited in attacks causing reboot loops.
MAIN POINTS:
- Cisco released security updates on September 25 for vulnerabilities CVE-2025-20362 and CVE-2025-20333.
- CVE-2025-20362 allows unauthenticated access to restricted URLs.
- CVE-2025-20333 enables remote code execution on vulnerable devices.
- Chained vulnerabilities let attackers gain full control over systems.
- CISA ordered federal agencies to secure or disconnect affected devices within 24 hours.
- Shadowserver tracks over 34,000 vulnerable ASA and FTD instances online.
- Vulnerabilities are exploited in denial of service (DoS) attacks.
- Attackers from the ArcaneDoor campaign are behind these exploits.
- Cisco fixed another critical vulnerability, CVE-2025-20363, in its IOS and firewall software.
- New security patches issued for Cisco Contact Center software to address critical flaws.
TAKEAWAYS:
- Immediate updates are crucial for securing Cisco firewall devices.
- Vulnerabilities can lead to severe consequences like denial of service attacks.
- Federal agencies are under strict directives to safeguard network security.
- Shadowserver’s tracking shows the widespread presence of vulnerable systems.
- Continued vigilance and patching are vital as new threats emerge.