{"id":5051,"date":"2025-09-25T21:15:43","date_gmt":"2025-09-25T21:15:43","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5051"},"modified":"2025-09-25T21:15:43","modified_gmt":"2025-09-25T21:15:43","slug":"patch-now-attacker-finds-another-zero-day-in-cisco-firewall-software","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5051","title":{"rendered":"Patch now: Attacker finds another zero day in Cisco firewall software"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>A critical zero-day vulnerability in certain Cisco Systems firewalls has to be patched immediately, US and UK cyber authorities warned Thursday.<\/p>\n<p>They said exploits of the hole are part of ongoing attacks on these and other network perimeter devices.<\/p>\n<p>The UK\u2019s National Cyber Security Centre (NCSC) <a href=\"https:\/\/www.ncsc.gov.uk\/news\/persistent-malicious-targeting-cisco-devices\" target=\"_blank\" rel=\"noopener\">called the alert<\/a> from Cisco a \u201csignificant update\u201d on a malicious campaign against perimeter network devices which was <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/04\/24\/cisco-releases-security-updates-addressing-arcanedoor-vulnerabilities-cisco-firewall-platforms\" target=\"_blank\" rel=\"noopener\">exposed last year<\/a> and dubbed ArcaneDoor. And the US Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/news-events\/directives\/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices\" target=\"_blank\" rel=\"noopener\">issued an emergency directive<\/a> ordering federal departments to identify, analyze, and mitigate potential compromises.<\/p>\n<p>The new vulnerability, CVE-2025-20363, is caused by improper validation of user-supplied input in HTTP requests, <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-http-code-exec-WmfP3h3O#details\" target=\"_blank\" rel=\"noopener\">Cisco said<\/a>.<\/p>\n<p>An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web service on an affected device, after obtaining additional information about the system, overcoming exploit mitigations, or both.<\/p>\n<p>A successful exploit could allow the attacker to execute arbitrary code as\u00a0<em>root<\/em>, which may lead to the complete compromise of the device.<\/p>\n<p>Affected are devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) software, Cisco Secure Firewall Threat Defense (FTD) software, as well as devices running Cisco IOS, IOS XE and IOS XR software.<\/p>\n<h2 class=\"wp-block-heading\">Two scenarios<\/h2>\n<p>There are two attack scenarios:<\/p>\n<p>an unauthenticated, remote attacker getting into devices running Cisco ASA and FTD software with one or more vulnerable configurations could execute arbitrary code;<\/p>\n<p>an authenticated, remote attacker getting into devices running Cisco IOS, IOS XE or IOS XR with low user privileges could execute arbitrary code on an affected Cisco device. However, note that devices running IOS or IOS XE are only affected if they have the Remote Access SSL VPN feature enabled. Devices running IOS XR are only affected if they are running on Cisco ASR 9001 routers with the HTTP server enabled.<\/p>\n<p>Cisco has released software updates that address this vulnerability, and strongly recommends that customers quickly upgrade to a fixed software release. There are no workarounds that address this issue.<\/p>\n<p>\u201cIt is critical for organizations to take note of the recommended actions highlighted by Cisco today, particularly on detection and remediation,\u201d said <a href=\"https:\/\/www.ncsc.gov.uk\/section\/about-ncsc\/ncsc-leadership\" target=\"_blank\" rel=\"noopener\">Ollie Whitehouse<\/a>, chief technology officer of the UK cyber center. \u00a0\u201cWe strongly encourage network defenders to follow vendor best practices and engage with the NCSC\u2019s malware analysis report to assist with their investigations.\u201d<\/p>\n<h2 class=\"wp-block-heading\">ASA 5500-X hit with multiple attacks<\/h2>\n<p>Cisco ASA 5500-X series models are affected, but Whitehouse noted some will be out of support starting this month. Where practicable, he said, such devices should be replaced or upgraded, because obsolete and end-of-life devices present a significant security risk to organizations.<\/p>\n<p>\u201cSystems and devices should be promptly migrated to modern versions to address vulnerabilities and strengthen resilience,\u201d he said.<\/p>\n<p>In fact, Cisco also said Thursday that it had found <a href=\"https:\/\/blog.talosintelligence.com\/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices\/\" target=\"_blank\" rel=\"noopener\">new activity specifically targeting the ASA 5500-X<\/a> series with two new vulnerabilities: CVE-2025-20333, CVE-2025-20362, as well as with CVE-2025-20363.<\/p>\n<p><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/asa_ftd_continued_attacks\" target=\"_blank\" rel=\"noopener\">In a background report outlining its response to attacks<\/a>, the company said that during its forensic analysis of confirmed compromised devices, it found that sometimes the threat actor modified the ROMMON firmware on Cisco devices. This firmware acts as a low-level bootloader and recovery tool that initializes hardware and loads the main operating system. Altering it allows the threat actor to maintain persistence across reboots and software upgrades.<\/p>\n<p>However, Cisco added, these modifications were seen only on ASA 5500-X Series platforms that were released prior to the development of <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/asr_5000\/21-26\/asr5500-sys-admin\/21-26-asr5500-sys-admin\/m_secureboot.pdf\" target=\"_blank\" rel=\"noopener\">Secure Boot<\/a> and <a href=\"https:\/\/blogs.cisco.com\/sp\/cisco-trusted-platforms\" target=\"_blank\" rel=\"noopener\">Trust Anchor<\/a> technologies. Cisco has not seen successful compromise, malware implantation, or the existence of a persistence mechanism on platforms that support Secure Boot and Trust Anchors.<\/p>\n<h2 class=\"wp-block-heading\">Take devices offline until patched: Analyst<\/h2>\n<p>A large probing attack against Cisco devices was reported in August, noted <a href=\"https:\/\/www.digitaldefence.ca\/company\/\" target=\"_blank\" rel=\"noopener\">Robert Beggs<\/a>, head of Canadian incident response firm DigitalDefence. At the time, he said, it was suggested that this would be a prelude to a widespread vulnerability exploitation.\u00a0\u201cIn this case, at least, the Cisco vulnerability was expected,\u201d he said.\u00a0\u201cThe detection of wide-scale probing of devices\u00a0appears to be a reliable predictor of a following attack.\u201d<\/p>\n<p>Because the vulnerabilities at the root of the attack can both be remotely exploited, affected devices should be taken offline until the patch is applied and verified to be in place, Beggs recommended.<\/p>\n<p>It\u2019s telling \u201cand somewhat startling,\u201d he added, that the CISA directive asks US federal agencies to supply memory files for forensic analysis on a \u201cnear immediate\u201d timeline for all public-facing Cisco ASA hardware appliances.<\/p>\n<p>Thursday\u2019s warning of critical vulnerabilities in Cisco products follows other <a href=\"https:\/\/www.networkworld.com\/article\/4063425\/cisco-admins-urged-to-patch-ios-ios-xe-devices.html\" target=\"_blank\" rel=\"noopener\">recent alerts<\/a>, he said, pointing out that there have been <a href=\"https:\/\/www.csoonline.com\/article\/4043721\/russian-hackers-exploit-old-cisco-flaw-to-target-global-enterprise-networks.html\" target=\"_blank\" rel=\"noopener\">several other critical vulnerabilities<\/a> identified in Cisco products this summer. These are good arguments for CSOs to implement <a href=\"https:\/\/www.csoonline.com\/article\/564201\/what-is-zero-trust-a-model-for-more-effective-security.html\" target=\"_blank\" rel=\"noopener\">a zero trust architecture<\/a>, he said, especially for monitoring sources for and applying updates on products in accordance with the risk they present to your organization.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>A critical zero-day vulnerability in certain Cisco Systems firewalls has to be patched immediately, US and UK cyber authorities warned Thursday. They said exploits of the hole are part of ongoing attacks on these and other network perimeter devices. The UK\u2019s National Cyber Security Centre (NCSC) called the alert from Cisco a \u201csignificant update\u201d on [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":5052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-5051","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5051"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5051"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5051\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/5052"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}