Cisco ASA Firewalls Targeted

Multiple zero-day vulnerabilities in Cisco ASA (Adaptive Security Appliance) firewalls are currently being exploited by a threat group known as “ArcaneDoor.” The campaign targets ASA 5500-X and FTD devices with VPN web services enabled, using flaws like CVE-2025-20333 and CVE-2025-20362 to execute arbitrary code and access restricted endpoints without authentication.

Why This Matters
  • Firewalls and VPN gateways are critical edge devices; compromising them gives attackers a powerful foothold into networks.
  • The attackers suppress logging, crash devices to avoid forensics, disable diagnostics, and deploy persistence malware (e.g., RayInitiator bootkit) that survives reboots and firmware updates.
  • Such persistence and stealth tactics make detection and remediation far more challenging.
Recommended Actions
  • Inventory all Cisco ASA and FTD devices to identify which ones are exposed and vulnerable.
  • Apply patches for the identified vulnerabilities as a first priority.
  • Where patching isn’t immediately possible, isolate devices, disable VPN web services, or restrict access.
  • Enhance monitoring and deploy anomaly detection tools to spot suspicious behavior.
  • After remediation, reset credentials, reconfigure devices, validate firmware/ROM integrity, and adopt segmentation and zero trust practices.
What This Incident Reveals

This campaign highlights how attackers are increasingly turning their attention to the very infrastructure meant to defend networks. Relying solely on perimeter devices is no longer sufficient – security must shift toward layered defenses, continuous visibility, and active integrity validation.

About COE Security

COE Security works with organizations in finance, government, healthcare, manufacturing, and technology to strengthen their cybersecurity posture. Our services include:

  • AI-driven threat detection and continuous monitoring
  • Protection for endpoints, networks, and infrastructure aligned with standards like GDPR, HIPAA, and PCI DSS
  • Penetration testing for cloud, web, IoT, and network systems
  • Secure software and product development (SSDLC) consulting
  • Customized training and red/blue team exercises

We help enterprises secure critical infrastructure, detect stealth intrusions, and respond to advanced threats with resilience and agility.

Click to read our LinkedIn feature article