CISA Emergency Directive 25-03: Mitigation of Cisco ASA Zero-Day Vulnerabilities
Summary
Hide ▲
Show ▼
The **Firestarter malware**, a custom backdoor linked to the **UAT-4356** threat actor (associated with the **ArcaneDoor campaign**), continues to persist on **Cisco Firepower and Secure Firewall devices** running ASA or FTD software **even after firmware updates and security patches**. CISA and the U.K. NCSC confirmed that the malware enables **remote access and control** by threat actors, with persistence mechanisms that survive reboots and patching. The adversary initially exploited **CVE-2025-20333** (missing authorization) and **CVE-2025-20362** (buffer overflow) to deploy **Line Viper**—a user-mode shellcode loader used to extract credentials and configuration details—before installing Firestarter for long-term access. CISA’s updated **Emergency Directive 25-03** now requires Federal Civilian Executive Branch (FCEB) agencies to **identify vulnerable Firepower and Secure Firewall devices**, collect forensic evidence, and apply vendor-provided mitigations. Over **30,000 devices remain exposed globally**, despite prior patching efforts, with some organizations **incorrectly applying updates** and leaving systems vulnerable. Cisco’s advisory details Firestarter’s persistence via **LINA process hooking**, modification of boot files (e.g., `CSP_MOUNT_LIST`), and memory-resident shellcode triggered by crafted WebVPN requests. Mitigation requires **device reimaging** or, as a last resort, a **cold restart** (with risks of corruption). Administrators are urged to verify compromises using the command `show kernel process | include lina_cs`. The campaign reflects a broader trend of **multi-platform exploitation**, with UAT-4356 also linked to zero-day attacks on **Citrix Bleed 2 (CVE-2025-5777)** and **Cisco ISE (CVE-2025-20337)**, deploying custom malware like **‘IdentityAuditAction’** for persistence. The indiscriminate yet sophisticated targeting suggests a **highly resourced actor** with access to advanced tools or non-public vulnerability intelligence.
Timeline
-
23.04.2026 15:00 2 articles · 2d ago
CISA publishes FIRESTARTER malware analysis and updates Emergency Directive 25-03
CISA published a **malware analysis report** on **FIRESTARTER**, a custom backdoor targeting Cisco Firepower and Secure Firewall products running ASA or FTD software. The report, co-authored with the **U.K. National Cyber Security Centre (NCSC-UK)**, confirms that FIRESTARTER enables **remote access and control** by threat actors and **persists across reboots, firmware updates, and security patches**—rendering standard patching insufficient. **New technical details** reveal FIRESTARTER hooks into **LINA**, the core Cisco ASA process, using **signal handlers** to trigger reinstallation routines. It modifies the **CSP_MOUNT_LIST boot file** to ensure execution on startup, stores a copy of itself in `/opt/cisco/platform/logs/var/log/svc_samcore.log`, and restores the binary to `/usr/bin/lina_cs`. The backdoor injects shellcode into memory via a modified **XML handler**, with execution triggered by **crafted WebVPN requests** containing hardcoded identifiers. CISA updated **Emergency Directive 25-03** to mandate FCEB agencies **identify vulnerable Firepower and Secure Firewall devices**, collect forensic data, and apply mitigations. Cisco’s advisory recommends **reimaging compromised devices** or, as a last resort, performing a **cold restart** (with risks of corruption). Administrators can detect compromises using the command `show kernel process | include lina_cs`. The report assesses that an **APT actor (UAT-4356)**, linked to the **ArcaneDoor campaign**, exploited **CVE-2025-20333** and **CVE-2025-20362** to deploy FIRESTARTER. The malware’s persistence mechanisms underscore the need for **manual forensic analysis** beyond patching, with CISA urging all organizations to verify mitigations and report findings.
Show sources
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
12.11.2025 16:00 2 articles · 5mo ago
Threat actor exploits Citrix Bleed 2 and Cisco ISE zero-days pre-disclosure
An advanced threat actor exploited **CVE-2025-5777 (Citrix Bleed 2)** in NetScaler ADC and Gateway and **CVE-2025-20337** in Cisco Identity Service Engine (ISE) as zero-days prior to public disclosure. Amazon’s threat intelligence team detected the activity via their MadPot honeypot service, observing exploitation attempts for CVE-2025-5777 before its disclosure in late June 2025. The same actor leveraged CVE-2025-20337—a critical deserialization flaw in Cisco ISE—to deploy a custom web shell named **‘IdentityAuditAction’**, disguised as a legitimate ISE component. The web shell functioned as an **HTTP listener**, used **Java reflection to inject into Tomcat server threads**, and employed **DES encryption with non-standard base64 encoding** to evade detection. Access required knowledge of specific HTTP headers, and the malware left minimal forensic traces. While the tactics demonstrate **advanced knowledge of Java/Tomcat internals and Cisco ISE architecture**, the targeting appeared indiscriminate, which is unusual for highly targeted APT operations. Amazon shared its findings with Cisco, prompting further investigation into the zero-day exploitation. The vulnerabilities allow unauthenticated attackers to **store malicious files, execute arbitrary code, or gain root privileges** on vulnerable devices. This development links the threat actor to a broader set of zero-day exploits beyond the previously reported Cisco ASA/FTD vulnerabilities, suggesting a **multi-platform campaign** with evolving tactics. Organizations are urged to apply security updates for both CVE-2025-5777 and CVE-2025-20337 and restrict access to edge network devices. Amazon’s latest report confirms the threat actor’s use of **custom-built malware** targeting Cisco ISE environments, employing advanced techniques such as in-memory operation, Tomcat thread injection, and non-standard encryption. The campaign’s indiscriminate nature, combined with the exploitation of multiple zero-days, suggests a highly capable adversary with access to sophisticated tools and potentially non-public vulnerability intelligence.
Show sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
07.11.2025 17:44 1 articles · 5mo ago
Cisco warns of new attack variant causing DoS conditions
Cisco warned that vulnerabilities CVE-2025-20362 and CVE-2025-20333 are now being exploited to force ASA and FTD firewalls into reboot loops. Shadowserver is currently tracking over 34,000 internet-exposed ASA and FTD instances vulnerable to CVE-2025-20333 and CVE-2025-20362 attacks, down from nearly 50,000 unpatched firewalls in September. Cisco disclosed new vulnerabilities in certain Cisco ASA 5500-X devices running Cisco Secure Firewall ASA software with VPN web services enabled, discovered in collaboration with several government agencies. Cisco attributed these attacks to the same state-sponsored group behind the 2024 ArcaneDoor campaign and urged customers to apply the available software fixes. On November 5, 2025, Cisco became aware of a new attack variant targeting devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases affected by the same vulnerabilities, causing unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions.
Show sources
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
26.09.2025 08:51 2 articles · 7mo ago
ArcaneDoor campaign deploys RayInitiator and LINE VIPER malware
The U.K. National Cyber Security Centre (NCSC) confirmed the exploitation of Cisco ASA zero-day vulnerabilities to deliver RayInitiator and LINE VIPER malware. Cisco began investigating attacks on multiple government agencies in May 2025, linked to the state-sponsored ArcaneDoor campaign. The attacks targeted Cisco ASA 5500-X Series devices to implant malware, execute commands, and potentially exfiltrate data. The threat actor modified ROMMON to facilitate persistence across reboots and software upgrades. The compromised devices include ASA 5500-X Series models running specific software releases with VPN web services enabled. The Canadian Centre for Cyber Security urged organizations to update to a fixed version of Cisco ASA and FTD products to counter the threat.
Show sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
25.09.2025 22:22 3 articles · 7mo ago
Cisco discloses additional zero-day vulnerability in SNMP subsystem
Cisco disclosed an additional zero-day vulnerability (CVE-2025-20352) affecting the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE. This flaw allows authenticated remote code execution and denial of service (DoS) attacks, affecting at least 2 million devices. Cisco strongly urges customers to update to a fixed version or implement mitigations immediately.
Show sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
25.09.2025 20:52 5 articles · 7mo ago
CISA orders agencies to patch Cisco flaws exploited in ArcaneDoor campaign
CISA ordered agencies to identify all Cisco ASA and Firepower appliances on their networks, disconnect all compromised devices from the network, and patch those that show no signs of malicious activity by 12 PM EDT on September 26. CISA also ordered that agencies must permanently disconnect ASA devices that are reaching the end of support by September 30 from their networks.
Show sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
25.09.2025 19:49 8 articles · 7mo ago
Cisco acknowledges exploitation of vulnerabilities and issues patches
Cisco credited security researcher Jahmel Harris for discovering and reporting the vulnerabilities. Cisco addressed two critical security flaws in Unified Contact Center Express (Unified CCX) that could permit an unauthenticated, remote attacker to upload arbitrary files, bypass authentication, execute arbitrary commands, and elevate privileges to root. Cisco has shipped patches for a high-severity DoS bug (CVE-2025-20343) in Identity Services Engine (ISE) that could allow an unauthenticated, remote attacker to cause a susceptible device to restart unexpectedly. Cisco released security updates to patch critical security flaws in its Contact Center software, which could enable attackers to bypass authentication (CVE-2025-20358) and execute commands with root privileges (CVE-2025-20354).
Show sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
25.09.2025 15:00 13 articles · 7mo ago
CISA issues Emergency Directive 25-03 for Cisco ASA zero-day vulnerabilities
The article confirms the ongoing exploitation of multiple zero-day vulnerabilities in Cisco ASA and Firewall Threat Defense (FTD) software. Nearly 50,000 Cisco ASA and FTD appliances were initially vulnerable to actively exploited flaws, with Shadowserver tracking over 48,800 internet-exposed instances in late September. The vulnerabilities **CVE-2025-20333** and **CVE-2025-20362** enable arbitrary code execution and access to restricted URL endpoints, with exploitation linked to the **ArcaneDoor campaign**. CISA’s **Emergency Directive 25-03**, issued on September 25, 2025, mandated federal agencies to identify and upgrade vulnerable devices within 24 hours, disconnect end-of-support systems, and apply minimum software versions. The directive also introduced the **RayDetect scanner** to detect RayInitiator malware in ASA core dumps. **New development:** CISA has now **updated Emergency Directive 25-03** to address the discovery of **FIRESTARTER malware**, which can persist on compromised Cisco ASA devices **even after firmware patching**. The updated directive requires FCEB agencies to **identify specified Firepower and Secure Firewall devices**, collect forensic data, and apply new vendor-provided updates. CISA confirmed that **some organizations incorrectly applied updates** for CVE-2025-20333 and CVE-2025-20362, leaving devices marked as patched but still vulnerable. Shadowserver’s latest data shows **over 30,000 devices remain exposed globally**, down from 45,000 in early October. The vulnerabilities have been exploited to force ASA and FTD firewalls into reboot loops, with the ArcaneDoor campaign deploying advanced malware (**RayInitiator**, **LINE VIPER**, and now **FIRESTARTER**) and manipulating ROM for persistence. CISA and the U.K. NCSC co-authored a **malware analysis report** on FIRESTARTER, detailing its persistence mechanisms, detection methods, and recommended mitigations. The report assesses that an **APT actor** exploited CVE-2025-20333 and CVE-2025-20362 to deploy FIRESTARTER, underscoring the need for organizations to **verify correct patch application** and conduct forensic analysis to ensure full mitigation.
Show sources
- CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities — www.cisa.gov — 25.09.2025 15:00
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
Information Snippets
-
CISA issued Emergency Directive 25-03 on September 25, 2025, targeting zero-day vulnerabilities in Cisco ASA devices.
First reported: 25.09.2025 15:004 sources, 12 articlesShow sources
- CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities — www.cisa.gov — 25.09.2025 15:00
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
The directive mandates federal agencies to account for all in-scope devices and collect forensic data.
First reported: 25.09.2025 15:004 sources, 10 articlesShow sources
- CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities — www.cisa.gov — 25.09.2025 15:00
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
Agencies must disconnect end-of-support devices and upgrade those that will remain in service by September 26, 2025.
First reported: 25.09.2025 15:004 sources, 10 articlesShow sources
- CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities — www.cisa.gov — 25.09.2025 15:00
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
The vulnerabilities allow threat actors to maintain persistence and gain access to victims' networks.
First reported: 25.09.2025 15:004 sources, 12 articlesShow sources
- CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities — www.cisa.gov — 25.09.2025 15:00
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA urges all organizations using Cisco ASA devices to adopt the actions outlined in the directive.
First reported: 25.09.2025 15:004 sources, 10 articlesShow sources
- CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities — www.cisa.gov — 25.09.2025 15:00
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
Cisco identified two zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in Cisco ASA and Firewall Threat Defense (FTD) software.
First reported: 25.09.2025 19:494 sources, 11 articlesShow sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CVE-2025-20333 allows authenticated, remote attackers to execute arbitrary code on vulnerable devices.
First reported: 25.09.2025 19:493 sources, 10 articlesShow sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
-
CVE-2025-20362 enables remote attackers to access restricted URL endpoints without authentication.
First reported: 25.09.2025 19:493 sources, 10 articlesShow sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
-
Cisco acknowledged attempted exploitation of CVE-2025-20333 and CVE-2025-20362.
First reported: 25.09.2025 19:493 sources, 9 articlesShow sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
-
Cisco patched a third critical vulnerability (CVE-2025-20363) in firewall and Cisco IOS software.
First reported: 25.09.2025 19:493 sources, 8 articlesShow sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
GreyNoise detected two large-scale campaigns in late August targeting ASA login portals and Cisco IOS Telnet/SSH services.
First reported: 25.09.2025 19:493 sources, 5 articlesShow sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
-
GreyNoise reported that reconnaissance activity often precedes the disclosure of new security vulnerabilities.
First reported: 25.09.2025 19:492 sources, 4 articlesShow sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
-
Cisco released security patches for a high-severity zero-day vulnerability in Cisco IOS and IOS XE software.
First reported: 25.09.2025 19:493 sources, 5 articlesShow sources
- Cisco warns of ASA firewall zero-days exploited in attacks — www.bleepingcomputer.com — 25.09.2025 19:49
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
CISA issued Emergency Directive 25-03 on September 25, 2025, targeting zero-day vulnerabilities in Cisco ASA devices.
First reported: 25.09.2025 20:523 sources, 6 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The directive mandates federal agencies to account for all in-scope devices and collect forensic data.
First reported: 25.09.2025 20:523 sources, 6 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Agencies must disconnect end-of-support devices and upgrade those that will remain in service by September 26, 2025.
First reported: 25.09.2025 20:523 sources, 6 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The vulnerabilities allow threat actors to maintain persistence and gain access to victims' networks.
First reported: 25.09.2025 20:523 sources, 6 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CISA urges all organizations using Cisco ASA devices to adopt the actions outlined in the directive.
First reported: 25.09.2025 20:523 sources, 7 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
-
Cisco identified two zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in Cisco ASA and Firewall Threat Defense (FTD) software.
First reported: 25.09.2025 20:523 sources, 7 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CVE-2025-20333 allows authenticated, remote attackers to execute arbitrary code on vulnerable devices.
First reported: 25.09.2025 20:523 sources, 6 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CVE-2025-20362 enables remote attackers to access restricted URL endpoints without authentication.
First reported: 25.09.2025 20:523 sources, 6 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco acknowledged attempted exploitation of CVE-2025-20333 and CVE-2025-20362.
First reported: 25.09.2025 20:523 sources, 6 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco patched a third critical vulnerability (CVE-2025-20363) in firewall and Cisco IOS software.
First reported: 25.09.2025 20:522 sources, 5 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
The campaign is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution on ASAs, as well as manipulating read-only memory (ROM) to persist through reboot and system upgrade.
First reported: 25.09.2025 20:523 sources, 7 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
CISA requires all FCEB agencies to identify all Cisco ASA and Firepower appliances on their networks, disconnect all compromised devices from the network, and patch those that show no signs of malicious activity by 12 PM EDT on September 26.
First reported: 25.09.2025 20:522 sources, 5 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
CISA ordered that agencies must permanently disconnect ASA devices that are reaching the end of support by September 30 from their networks.
First reported: 25.09.2025 20:522 sources, 5 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
Cisco linked these ongoing attacks to the ArcaneDoor campaign, which exploited two other ASA and FTD zero-days (CVE-2024-20353 and CVE-2024-20359) to breach government networks worldwide since November 2023.
First reported: 25.09.2025 20:523 sources, 7 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
Cisco became aware of the ArcaneDoor attacks in early January 2024 and discovered evidence that the UAT4356 threat group behind the campaign (tracked as STORM-1849 by Microsoft) had tested and developed exploits for the two zero-days since at least July 2023.
First reported: 25.09.2025 20:523 sources, 7 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
In the attacks, the hackers deployed previously unknown Line Dancer in-memory shellcode loader and Line Runner backdoor malware to maintain persistence on compromised Cisco devices.
First reported: 25.09.2025 20:523 sources, 7 articlesShow sources
- CISA orders agencies to patch Cisco flaws exploited in zero-day attacks — www.bleepingcomputer.com — 25.09.2025 20:52
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
CISA issued Emergency Directive 25-03 on September 25, 2025, targeting zero-day vulnerabilities in Cisco ASA devices.
First reported: 25.09.2025 21:173 sources, 6 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The directive mandates federal agencies to account for all in-scope devices and collect forensic data.
First reported: 25.09.2025 21:173 sources, 6 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Agencies must disconnect end-of-support devices and upgrade those that will remain in service by September 26, 2025.
First reported: 25.09.2025 21:173 sources, 6 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CVE-2025-20333 allows authenticated, remote attackers to execute arbitrary code on vulnerable devices.
First reported: 25.09.2025 21:173 sources, 6 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CVE-2025-20362 enables remote attackers to access restricted URL endpoints without authentication.
First reported: 25.09.2025 21:173 sources, 6 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco acknowledged attempted exploitation of CVE-2025-20333 and CVE-2025-20362.
First reported: 25.09.2025 21:173 sources, 6 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco patched a third critical vulnerability (CVE-2025-20363) in firewall and Cisco IOS software.
First reported: 25.09.2025 21:172 sources, 5 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
The campaign is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution on ASAs, as well as manipulating read-only memory (ROM) to persist through reboot and system upgrade.
First reported: 25.09.2025 21:172 sources, 5 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
CISA and Cisco linked these ongoing attacks to the ArcaneDoor campaign, which exploited two other ASA and FTD zero-days (CVE-2024-20353 and CVE-2024-20359) to breach government networks worldwide since November 2023.
First reported: 25.09.2025 21:174 sources, 9 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
Cisco became aware of the ArcaneDoor attacks in early January 2024 and discovered evidence that the UAT4356 threat group behind the campaign (tracked as STORM-1849 by Microsoft) had tested and developed exploits for the two zero-days since at least July 2023.
First reported: 25.09.2025 21:173 sources, 6 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
In the attacks, the hackers deployed previously unknown Line Dancer in-memory shellcode loader and Line Runner backdoor malware to maintain persistence on compromised Cisco devices.
First reported: 25.09.2025 21:174 sources, 7 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA ordered agencies to identify all Cisco ASA and Firepower appliances on their networks, disconnect all compromised devices from the network, and patch those that show no signs of malicious activity by 12 PM EDT on September 26.
First reported: 25.09.2025 21:174 sources, 7 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CISA ordered that agencies must permanently disconnect ASA devices that are reaching the end of support by September 30 from their networks.
First reported: 25.09.2025 21:174 sources, 7 articlesShow sources
- Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive — thehackernews.com — 25.09.2025 21:17
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CISA and Cisco confirmed that the ArcaneDoor campaign has been exploiting zero-day vulnerabilities in Cisco ASA and Firewall Threat Defense (FTD) software since at least July 2023.
First reported: 25.09.2025 22:224 sources, 7 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
The vulnerabilities allow threat actors to gain unauthenticated remote code execution on ASAs and manipulate read-only memory (ROM) to persist through reboots and system upgrades.
First reported: 25.09.2025 22:224 sources, 7 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
Cisco ASA 5500-X series firewall models running specific software releases with VPN Web services enabled are particularly vulnerable.
First reported: 25.09.2025 22:224 sources, 7 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA's directive mandates that federal agencies disconnect end-of-support devices and upgrade those that will remain in service by 11:59 PM EST on September 26, 2025.
First reported: 25.09.2025 22:224 sources, 6 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco disclosed an additional zero-day vulnerability (CVE-2025-20352) affecting the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE, which allows authenticated remote code execution and denial of service (DoS).
First reported: 25.09.2025 22:224 sources, 6 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The flaw in SNMP affects at least 2 million devices, and Cisco strongly urges customers to update to a fixed version or implement mitigations immediately.
First reported: 25.09.2025 22:224 sources, 6 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The ArcaneDoor campaign has compromised multiple US federal agencies, although the specific nation-state actors have not been formally attributed.
First reported: 25.09.2025 22:224 sources, 7 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
-
Cisco devices are attractive targets for attackers due to their ubiquity, network choke points, and shared code across many platforms.
First reported: 25.09.2025 22:224 sources, 6 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The SNMP vulnerability allows attackers to gain root access on affected devices, which is higher than admin access and can lead to full system control.
First reported: 25.09.2025 22:224 sources, 6 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The vulnerability also enables a denial of service (DoS) attack on affected Cisco devices when exploited by an authenticated, remote attacker with low privileges.
First reported: 25.09.2025 22:224 sources, 6 articlesShow sources
- Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS — www.darkreading.com — 25.09.2025 22:22
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The U.K. National Cyber Security Centre (NCSC) confirmed the exploitation of Cisco ASA zero-day vulnerabilities to deliver RayInitiator and LINE VIPER malware.
First reported: 26.09.2025 08:513 sources, 5 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco began investigating attacks on multiple government agencies in May 2025, linked to the state-sponsored ArcaneDoor campaign.
First reported: 26.09.2025 08:513 sources, 5 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The attacks targeted Cisco ASA 5500-X Series devices to implant malware, execute commands, and potentially exfiltrate data.
First reported: 26.09.2025 08:513 sources, 5 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The campaign exploited CVE-2025-20362 and CVE-2025-20333 to bypass authentication and execute malicious code on susceptible appliances.
First reported: 26.09.2025 08:513 sources, 6 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
The threat actor modified ROMMON to facilitate persistence across reboots and software upgrades on affected devices.
First reported: 26.09.2025 08:513 sources, 6 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
The compromised devices include ASA 5500-X Series models running specific software releases with VPN web services enabled.
First reported: 26.09.2025 08:513 sources, 5 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The U.K. NCSC described RayInitiator as a persistent GRand Unified Bootloader (GRUB) bootkit capable of surviving reboots and firmware upgrades.
First reported: 26.09.2025 08:513 sources, 5 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
LINE VIPER is a user-mode shellcode loader that can run CLI commands, perform packet captures, and bypass VPN authentication.
First reported: 26.09.2025 08:513 sources, 5 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
LINE VIPER communicates with the command-and-control (C2) server using WebVPN client authentication sessions over HTTPS or ICMP with responses over raw TCP.
First reported: 26.09.2025 08:513 sources, 5 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The Canadian Centre for Cyber Security urged organizations to update to a fixed version of Cisco ASA and FTD products to counter the threat.
First reported: 26.09.2025 08:513 sources, 5 articlesShow sources
- Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware — thehackernews.com — 26.09.2025 08:51
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Nearly 50,000 Cisco ASA and FTD appliances are vulnerable to actively exploited flaws.
First reported: 30.09.2025 19:583 sources, 5 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
-
The vulnerabilities CVE-2025-20333 and CVE-2025-20362 enable arbitrary code execution and access to restricted URL endpoints.
First reported: 30.09.2025 19:583 sources, 8 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
The Shadowserver Foundation discovered over 48,800 internet-exposed ASA and FTD instances still vulnerable to the flaws.
First reported: 30.09.2025 19:583 sources, 5 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
-
The majority of vulnerable devices are located in the United States, followed by the United Kingdom, Japan, Germany, Russia, Canada, and Denmark.
First reported: 30.09.2025 19:583 sources, 4 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The Shadowserver Foundation's data is as of September 29, indicating a lack of response to the ongoing exploitation activity.
First reported: 30.09.2025 19:583 sources, 4 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Greynoise had warned on September 4 about suspicious scans targeting Cisco ASA devices, indicating upcoming undocumented flaws.
First reported: 30.09.2025 19:583 sources, 4 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CISA's emergency directive gave 24 hours to FCEB agencies to identify and upgrade vulnerable Cisco ASA and FTD instances.
First reported: 30.09.2025 19:583 sources, 4 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CISA advised that ASA devices reaching their end of support should be disconnected from federal networks by the end of September.
First reported: 30.09.2025 19:583 sources, 4 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The U.K. NCSC reported that the hackers deployed Line Viper shellcode loader malware and RayInitiator GRUB bootkit.
First reported: 30.09.2025 19:583 sources, 5 articlesShow sources
- Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws — www.bleepingcomputer.com — 30.09.2025 19:58
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
Cisco identified a new attack variant targeting devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases susceptible to CVE-2025-20333 and CVE-2025-20362.
First reported: 06.11.2025 16:583 sources, 3 articlesShow sources
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
The new attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service (DoS) conditions.
First reported: 06.11.2025 16:583 sources, 4 articlesShow sources
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
Cisco credited security researcher Jahmel Harris for discovering and reporting the vulnerabilities.
First reported: 06.11.2025 16:583 sources, 3 articlesShow sources
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco addressed two critical security flaws in Unified Contact Center Express (Unified CCX) that could permit an unauthenticated, remote attacker to upload arbitrary files, bypass authentication, execute arbitrary commands, and elevate privileges to root.
First reported: 06.11.2025 16:583 sources, 3 articlesShow sources
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco has shipped patches for a high-severity DoS bug (CVE-2025-20343) in Identity Services Engine (ISE) that could allow an unauthenticated, remote attacker to cause a susceptible device to restart unexpectedly.
First reported: 06.11.2025 16:582 sources, 2 articlesShow sources
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 — thehackernews.com — 06.11.2025 16:58
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco warned that vulnerabilities CVE-2025-20362 and CVE-2025-20333 are now being exploited to force ASA and FTD firewalls into reboot loops.
First reported: 07.11.2025 17:442 sources, 2 articlesShow sources
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Shadowserver is currently tracking over 34,000 internet-exposed ASA and FTD instances vulnerable to CVE-2025-20333 and CVE-2025-20362 attacks, down from nearly 50,000 unpatched firewalls in September.
First reported: 07.11.2025 17:443 sources, 4 articlesShow sources
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
-
Cisco disclosed new vulnerabilities in certain Cisco ASA 5500-X devices running Cisco Secure Firewall ASA software with VPN web services enabled, discovered in collaboration with several government agencies.
First reported: 07.11.2025 17:442 sources, 2 articlesShow sources
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco attributed these attacks to the same state-sponsored group behind the 2024 ArcaneDoor campaign and urged customers to apply the available software fixes.
First reported: 07.11.2025 17:442 sources, 2 articlesShow sources
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
On November 5, 2025, Cisco became aware of a new attack variant targeting devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases affected by the same vulnerabilities, causing unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions.
First reported: 07.11.2025 17:442 sources, 2 articlesShow sources
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
Cisco released security updates to patch critical security flaws in its Contact Center software, which could enable attackers to bypass authentication (CVE-2025-20358) and execute commands with root privileges (CVE-2025-20354).
First reported: 07.11.2025 17:441 source, 1 articleShow sources
- Cisco: Actively exploited firewall flaws now abused for DoS attacks — www.bleepingcomputer.com — 07.11.2025 17:44
-
An advanced threat actor exploited CVE-2025-5777 (Citrix Bleed 2) in NetScaler ADC and Gateway as a zero-day before public disclosure.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
Amazon’s threat intelligence team detected zero-day exploitation of CVE-2025-5777 via the MadPot honeypot service prior to its public disclosure.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
The same threat actor exploited CVE-2025-20337, a critical Cisco Identity Service Engine (ISE) vulnerability, as a zero-day to deploy a custom web shell named 'IdentityAuditAction'.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
CVE-2025-20337 allows unauthenticated attackers to store malicious files, execute arbitrary code, or gain root privileges on vulnerable Cisco ISE devices.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
The custom web shell 'IdentityAuditAction' was disguised as a legitimate ISE component, registered as an HTTP listener, and used Java reflection to inject into Tomcat server threads.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
The web shell employed DES encryption with non-standard base64 encoding for stealth and required specific HTTP headers for access, leaving minimal forensic traces.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
The threat actor demonstrated advanced knowledge of Java/Tomcat internals and Cisco ISE architecture, suggesting a highly resourced and sophisticated operation.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
Despite the advanced tactics, the targeting appeared indiscriminate, which is atypical for highly targeted APT operations.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
Amazon shared its findings with Cisco, prompting further investigation into the zero-day exploitation of CVE-2025-20337.
First reported: 12.11.2025 16:002 sources, 2 articlesShow sources
- Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks — www.bleepingcomputer.com — 12.11.2025 16:00
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
Amazon's MadPot honeypot network detected zero-day exploitation of CVE-2025-5777 (Citrix Bleed 2) and CVE-2025-20337 (Cisco ISE) in a coordinated campaign deploying the 'IdentityAuditAction' web shell.
First reported: 12.11.2025 16:001 source, 1 articleShow sources
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
The 'IdentityAuditAction' web shell operated in-memory, registered as an HTTP listener for all Tomcat server requests, and used Java reflection for injection and DES encryption with non-standard Base64 encoding for evasion.
First reported: 12.11.2025 16:001 source, 1 articleShow sources
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
Amazon characterized the campaign as indiscriminate but executed by a highly resourced actor, likely possessing advanced vulnerability research capabilities or access to non-public vulnerability information.
First reported: 12.11.2025 16:001 source, 1 articleShow sources
- Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws — thehackernews.com — 12.11.2025 16:00
-
CISA released implementation guidance for Emergency Directive 25-03, detailing minimum software versions required to address vulnerabilities in Cisco ASA and Firepower devices.
First reported: 12.11.2025 14:001 source, 2 articlesShow sources
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA's guidance directs federal agencies to conduct corrective patching measures on non-compliant devices and recommends all organizations verify the application of minimum software version updates.
First reported: 12.11.2025 14:001 source, 2 articlesShow sources
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA provided the RayDetect scanner tool to examine ASA core dumps for evidence of RayInitiator compromise as part of the implementation guidance.
First reported: 12.11.2025 14:001 source, 1 articleShow sources
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CISA's Temporary Risk Mitigation Guidance offers detailed recommendations for agencies still in the process of complying with Emergency Directive 25-03.
First reported: 12.11.2025 14:001 source, 1 articleShow sources
- CISA Identifies Ongoing Cyber Threats to Cisco ASA and Firepower Devices — www.cisa.gov — 12.11.2025 14:00
-
CISA has identified multiple organizations that incorrectly applied updates for CVE-2025-20333 and CVE-2025-20362, leaving devices marked as 'patched' but still vulnerable to active exploitation.
First reported: 13.11.2025 12:103 sources, 3 articlesShow sources
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA urges all organizations to verify that the correct minimum software versions have been applied to fully mitigate the vulnerabilities targeted by Emergency Directive 25-03.
First reported: 13.11.2025 12:103 sources, 3 articlesShow sources
- ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories — thehackernews.com — 13.11.2025 12:10
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA has identified devices marked as 'patched' in agency reporting templates that were updated to software versions still vulnerable to the threat activity outlined in Emergency Directive 25-03.
First reported: 13.11.2025 14:052 sources, 2 articlesShow sources
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA is tracking active exploitation of vulnerable software versions in Federal Civilian Executive Branch (FCEB) agencies despite agencies believing they had applied necessary updates.
First reported: 13.11.2025 14:052 sources, 2 articlesShow sources
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
Shadowserver currently tracks over 30,000 Cisco devices vulnerable to CVE-2025-20362 and CVE-2025-20333 attacks, down from over 45,000 in early October 2025.
First reported: 13.11.2025 14:052 sources, 2 articlesShow sources
- CISA warns feds to fully patch actively exploited Cisco flaws — www.bleepingcomputer.com — 13.11.2025 14:05
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
-
CISA published a malware analysis report on **FIRESTARTER**, a new malware targeting Cisco Firepower and Secure Firewall products running ASA or FTD software, which enables remote access and control by threat actors.
First reported: 23.04.2026 15:002 sources, 2 articlesShow sources
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
FIRESTARTER can persist on compromised Cisco ASA devices even after firmware patching, indicating that patching alone does not remove existing threats.
First reported: 23.04.2026 15:002 sources, 2 articlesShow sources
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
CISA updated **Emergency Directive 25-03** to include new required actions for FCEB agencies: identifying specified Firepower and Secure Firewall devices, collecting forensic data, and applying new vendor-provided updates.
First reported: 23.04.2026 15:002 sources, 2 articlesShow sources
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
CISA and the U.K. National Cyber Security Centre (NCSC-UK) co-authored the FIRESTARTER malware analysis report, assessing that an advanced persistent threat (APT) actor exploited **CVE-2025-20333** and **CVE-2025-20362** to deploy FIRESTARTER.
First reported: 23.04.2026 15:002 sources, 2 articlesShow sources
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
CISA detected FIRESTARTER malware during proactive monitoring of Cisco ASA devices used by FCEB agencies, confirming post-patching persistence on compromised devices.
First reported: 23.04.2026 15:002 sources, 2 articlesShow sources
- CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products — www.cisa.gov — 23.04.2026 15:00
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
The Firestarter backdoor hooks into LINA, the core Cisco ASA process, using signal handlers that trigger reinstallation routines to maintain persistence across reboots, firmware updates, and security patches.
First reported: 24.04.2026 23:341 source, 1 articleShow sources
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
Firestarter modifies the CSP_MOUNT_LIST boot/mount file to ensure execution on startup and stores a copy of itself in `/opt/cisco/platform/logs/var/log/svc_samcore.log`, restoring it to `/usr/bin/lina_cs` where it runs in the background.
First reported: 24.04.2026 23:341 source, 1 articleShow sources
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
The backdoor uses a mechanism where it hooks into LINA by modifying an XML handler and injecting shellcode into memory, creating a controlled execution path triggered by a specially crafted WebVPN request.
First reported: 24.04.2026 23:341 source, 1 articleShow sources
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
Cisco recommends reimaging and upgrading affected devices using fixed releases, or performing a cold restart (disconnecting power) as a temporary workaround, though the latter risks database or disk corruption.
First reported: 24.04.2026 23:341 source, 1 articleShow sources
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
-
Administrators can check for compromise by running the command `show kernel process | include lina_cs`; any output indicates a compromised device.
First reported: 24.04.2026 23:341 source, 1 articleShow sources
- Firestarter malware survives Cisco firewall updates, security patches — www.bleepingcomputer.com — 24.04.2026 23:34
Similar Happenings
Active exploitation of Citrix NetScaler ADC/Gateway memory disclosure vulnerability (CVE-2026-3055)
A critical out-of-bounds read vulnerability in Citrix NetScaler ADC and NetScaler Gateway, tracked as CVE-2026-3055, is being actively exploited in the wild to leak sensitive information and extract administrative session IDs from appliance memory, enabling potential full appliance takeover. Citrix disclosed the flaw on March 23, 2026, alongside a high-severity race condition flaw, affecting versions before 14.1-60.58, 13.1-62.23, and those older than 13.1-37.262. The vulnerability requires appliances to be configured as SAML Identity Providers and impacts only customer-managed systems. Exploitation was confirmed via honeypot networks on March 27, with attackers leveraging both /saml/login and /wsfed/passive endpoints to trigger memory overread conditions. Security researchers criticize Citrix’s disclosure as incomplete and provide tools to detect vulnerable hosts. On March 30, 2026, CISA added CVE-2026-3055 to its Known Exploited Vulnerabilities (KEV) Catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to patch vulnerable Citrix appliances by April 2, 2026 under BOD 22-01. CISA warned the flaw poses significant risks to the federal enterprise and urged all organizations to prioritize patching. Shadowserver reports nearly 30,000 exposed NetScaler ADC appliances and over 2,300 exposed Gateway instances online.
Active exploitation of F5 BIG-IP RCE vulnerability CVE-2025-53521
CVE-2025-53521, initially disclosed as a DoS flaw in October 2025, has been reclassified as a critical RCE vulnerability (CVSS 9.8) following new exploitation activity in March 2026. Threat actors are actively exploiting the flaw by sending malicious traffic to virtual servers configured with BIG-IP AMP or systems in appliance mode to deploy webshells and other payloads. F5 has confirmed exploitation in the wild and published IOCs, while CISA added the flaw to its KEV catalog on March 28, 2026, mandating federal remediation within three days. Multiple actors are probing F5 infrastructure, with observed payload deviations and scanning targeting REST API endpoints. Shadowserver tracks over 240,000 exposed BIG-IP instances, and the NCSC has urged immediate patching in the UK due to confirmed exploitation activity. The flaw affects BIG-IP APM versions 15.1.0–15.1.10, 16.1.0–16.1.6, 17.1.0–17.1.2, and 17.5.0–17.5.1. Fixed versions (15.1.10.8, 16.1.6.1, 17.1.3, 17.5.1.3) are available, and F5 recommends forensic best practices including system rebuilding due to potential persistent malware in UCS backups.
Microsoft Intune administrative control weaknesses exploited in Stryker breach leading to mass device wipes
A pro-Palestinian hacktivist group named Handala (also tracked as Handala Hack Team, Hatef, or Hamsa) compromised Microsoft Intune administrative controls at Stryker Corporation, a U.S.-based medical technology firm, on March 11, 2026. The attackers created a new Global Administrator account after breaching an existing administrator credential, stole approximately 50 terabytes of data, and executed device wipes across nearly 80,000 systems via Intune’s built-in wipe command. The incident follows Microsoft’s hardening guidance for Intune published days after the breach, which CISA subsequently mandated for all U.S. organizations to mitigate similar risks. The attack highlights the risks of excessive administrative privileges and insufficient privileged access hygiene in cloud-based endpoint management platforms.
Cisco SD-WAN Zero-Day Exploited by Highly Sophisticated Threat Actor
A critical zero-day vulnerability (CVE-2026-20127) in Cisco Catalyst SD-WAN Controller and Manager is being actively exploited by a sophisticated threat actor, tracked as UAT-8616. The flaw allows unauthenticated remote attackers to bypass authentication and gain administrative privileges. The exploitation dates back to 2023, and Cisco has credited the Australian Signals Directorate's Australian Cyber Security Centre (ASD-ACSC) for reporting the vulnerability. The vulnerability has a CVSS score of 10.0, indicating maximum severity. Cisco is actively tracking the exploitation and post-compromise activities associated with this flaw. The threat actor is described as highly sophisticated, and the exploitation has been ongoing for some time.
AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks
A Russian-speaking, financially motivated hacker used generative AI services to breach over 600 FortiGate firewalls across 55 countries in five weeks. The campaign, which occurred between January 11 and February 18, 2026, targeted exposed management interfaces and weak credentials lacking MFA protection. The attacker used AI to automate access to other devices on breached networks, extracting sensitive configuration data and conducting reconnaissance. The attacker successfully compromised multiple organizations' Active Directory environments, extracted complete credential databases, and targeted backup infrastructure, likely in a lead-up to ransomware deployment. The threat actor used the CyberStrikeAI AI-powered security testing platform, which integrates over 100 security tools and allows for end-to-end automation of attacks. The developer of CyberStrikeAI, known as "Ed1s0nZ," has links to Chinese government-affiliated cyber operations and has worked on additional AI-assisted security tools. Team Cymru detected 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, primarily hosted in China, Singapore, and Hong Kong. Additional servers related to CyberStrikeAI have been detected in the U.S., Japan, and Switzerland. The developer has interacted with organizations supporting potentially Chinese government state-sponsored cyber operations, including Knownsec 404, a Chinese security vendor with ties to the Chinese Ministry of State Security (MSS). Ed1s0nZ has removed references to a CNNVD Level 2 Contribution Award from their GitHub profile. The campaign targeted healthcare, government, and managed service providers. The attackers exploited vulnerabilities CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858. The attackers created a new local administrator account named "support" and set up four new firewall policies allowing unrestricted access. The attackers periodically checked device accessibility, consistent with initial access broker (IAB) behavior. The attackers extracted configuration files containing encrypted service account LDAP credentials. The attackers authenticated to the AD using clear text credentials from the fortidcagent service account. The attackers enrolled rogue workstations in the AD, allowing deeper access. The attackers deployed remote access tools like Pulseway and MeshAgent. The attackers downloaded malware from a cloud storage bucket via PowerShell from AWS infrastructure. The Java malware was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server (172.67.196[.]232) over port 443.