Description
Cisco has released emergency security patches for three critical zero-day vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) software, two of which are being actively exploited in the wild by an advanced threat actor linked to the ArcaneDoor campaign. The vulnerabilities CVE-2025-20333, CVE-2025-20362, and CVE-2025-20363 allow attackers to execute arbitrary code, bypass authentication, and implant persistent malware on affected devices.
Attack Details
The campaign exploits multiple high-severity vulnerabilities to gain and maintain control of targeted network devices: CVE-2025-20333 (CVSS 9.9) is a critical remote code execution flaw that lets an authenticated remote attacker with valid VPN credentials execute arbitrary code as root via crafted HTTP requests to the VPN web server, while CVE-2025-20362 (CVSS 6.5) is an authentication-bypass flaw enabling unauthenticated attackers to reach restricted URL endpoints with specially crafted requests. In addition, CVE-2025-20363 (CVSS 9.0) represents a critical unauthenticated remote code execution weakness in firewall and Cisco IOS software that, though not yet observed in the wild, is assessed as high risk for imminent exploitation. Attackers have been chaining CVE-2025-20333 and CVE-2025-20362 to circumvent authentication and achieve full control over vulnerable devices, targeting government networks worldwide for data exfiltration. The threat actor uses advanced evasion techniques (disabling logging, intercepting CLI commands, and deliberately crashing devices to frustrate forensic analysis) and has deployed persistent malware capable of surviving reboots by modifying device ROM a persistence technique first seen in the ArcaneDoor campaign in early 2024. Affected hardware includes Cisco ASA 5500-X series models (5512-X, 5515-X, 5525-X, 5545-X, 5555-X, 5585-X) and certain Cisco Firepower appliance versions.
Remediation
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: Cisco ASA and FTD Zero-Day Vulnerabilities Actively Exploited in State-Sponsored Attacks
References