Source: Cyber Security News
Author: Guru Baran
URL: https://cybersecuritynews.com/cisco-asa-and-ftd-software-0-day-vulnerability/
ONE SENTENCE SUMMARY:
Cisco’s advisory highlights a zero-day exploit chain, combining two vulnerabilities for remote code execution, urging immediate software updates.
MAIN POINTS:
- Cisco released advisories on zero-day exploits affecting ASA and FTD software.
- The exploit chain uses vulnerabilities CVE-2025-20362 and CVE-2025-20333.
- Unauthenticated remote code execution is the primary risk from these exploits.
- CVE-2025-20362 allows authentication bypass, achieved through path traversal.
- CVE-2025-20333 is a buffer overflow within the WebVPN file upload process.
- Attackers can exploit these flaws via unauthorized endpoints.
- Rapid7 analysis points to memory corruption through crafted HTTP requests.
- A third vulnerability, CVE-2025-20363, was patched but isn’t actively exploited.
- Cisco released updates, including ASAv 9.16.4.85, to mitigate threats.
- Immediate system updates are crucial to prevent potential exploitation.
TAKEAWAYS:
- Cisco’s firewall products are under active targeted attacks via a zero-day exploit chain.
- Critical vulnerabilities allow attackers to bypass authentication and execute remote code.
- Exploits involve a complex two-stage process targeting the WebVPN component.
- Updating software to the latest versions is crucial for security.
- Cisco’s security patches provide necessary defenses against active exploits.