Particle.news

Download on the App Store

CISA Orders Emergency Fixes as Cisco Firewall Zero-Days Are Actively Exploited

Federal agencies face 24-hour deadlines to inventory devices, collect forensics, patch affected firewalls, then retire unsupported models due to ROMMON-level persistence.

Overview

  • CISA issued Emergency Directive 25-03 and added CVE-2025-20333 and CVE-2025-20362 to its KEV catalog, citing unacceptable risk from ongoing exploitation of Cisco ASA and Firepower devices.
  • Cisco released patches for the ASA/FTD VPN web server flaws, warning that attackers can chain them to gain full control, and noted a third bug (CVE-2025-20363) is patched but not known to be exploited.
  • Agencies must identify all ASA and Firepower appliances, submit memory forensics, isolate any compromised devices, patch by September 26 at noon ET, and permanently disconnect end‑of‑support hardware by September 30.
  • Cisco linked the intrusions to the ArcaneDoor threat cluster (UAT4356/Storm‑1849) and documented evasion tactics including disabled logging, intercepted CLI commands, and deliberate device crashes.
  • Investigations found ROMMON modifications on legacy ASA 5500‑X models lacking Secure Boot or Trust Anchor, prompting guidance to update, rotate credentials and keys, validate ROM checks, and replace unsupported devices; separately, Cisco also patched an actively exploited IOS/IOS XE SNMP zero‑day (CVE‑2025‑20352) affecting systems with SNMP enabled.