Cisco Firewall Fiasco: CISA’s Emergency Directive to Ditch Zero-Day Drama
CISA has sounded the alarm, ordering federal agencies to patch Cisco firewall flaws under Emergency Directive 25-03. The vulnerabilities, CVE-2025-20333 and CVE-2025-20362, have been exploited in zero-day attacks. Agencies must identify, patch, or disconnect vulnerable devices swiftly to thwart the ArcaneDoor campaign’s attempted network invasions.

Hot Take:
When the CISA says “jump,” federal agencies have to ask, “How high?” This time, it’s a high-stakes game of patch-and-go, with Cisco firewalls as the star performers. Zero-day exploits, a mysterious ArcaneDoor campaign, and more acronyms than you can shake a defunct firewall at—it’s a cybersecurity thriller that would make any IT professional break into a cold sweat. Just another day at the office for the folks at CISA, who seem to have a knack for turning cybersecurity into a full-blown action movie.
Key Points:
- CISA issued Emergency Directive 25-03 to secure Cisco firewalls against two zero-day vulnerabilities.
- Federal agencies must patch vulnerabilities CVE-2025-20333 and CVE-2025-20362 by September 26.
- Exploitation linked to the ArcaneDoor campaign with advanced evasion techniques.
- Cisco released updates and observed persistent threats through modified ROMMON.
- Additional vulnerabilities, including CVE-2025-20363, patched by Cisco but not directly linked to ongoing attacks.