Cisco’s Firewall Fracas: New Attack Variant Sparks Security Scramble

Cisco warns that a new attack variant is targeting Secure Firewall ASA and FTD devices. Exploiting vulnerabilities CVE-2025-20333 and CVE-2025-20362, this attack can cause unpatched devices to reload unexpectedly, leading to denial of service conditions. Cisco strongly advises updating to fixed software releases.

Pro Dashboard

Hot Take:

Ah, Cisco, the firewall equivalent of a bouncer who occasionally forgets to check IDs properly. With the latest attack variant exploiting CVE-2025-20333 and CVE-2025-20362, it seems like hackers are having a field day with Cisco’s Secure Firewall ASA and FTD devices. Time to patch up those vulnerabilities before your network security is as useful as a chocolate teapot!

Key Points:

– Cisco warns of a new attack variant targeting Secure Firewall ASA and FTD devices.
– Exploits vulnerabilities CVE-2025-20333 (buffer overflow) and CVE-2025-20362 (missing authorization).
– The vulnerabilities are in the U.S. CISA’s Known Exploited Vulnerabilities catalog.
– New malware, RayInitiator and LINE VIPER, are linked to these vulnerabilities.
– Cisco attributes the attacks to the ArcaneDoor threat actor but sees no evidence of broader breaches.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?