Cisco’s Firewall Fracas: New Attack Variant Sparks Security Scramble
Cisco warns that a new attack variant is targeting Secure Firewall ASA and FTD devices. Exploiting vulnerabilities CVE-2025-20333 and CVE-2025-20362, this attack can cause unpatched devices to reload unexpectedly, leading to denial of service conditions. Cisco strongly advises updating to fixed software releases.

Hot Take:
Ah, Cisco, the firewall equivalent of a bouncer who occasionally forgets to check IDs properly. With the latest attack variant exploiting CVE-2025-20333 and CVE-2025-20362, it seems like hackers are having a field day with Cisco’s Secure Firewall ASA and FTD devices. Time to patch up those vulnerabilities before your network security is as useful as a chocolate teapot!
Key Points:
– Cisco warns of a new attack variant targeting Secure Firewall ASA and FTD devices.
– Exploits vulnerabilities CVE-2025-20333 (buffer overflow) and CVE-2025-20362 (missing authorization).
– The vulnerabilities are in the U.S. CISA’s Known Exploited Vulnerabilities catalog.
– New malware, RayInitiator and LINE VIPER, are linked to these vulnerabilities.
– Cisco attributes the attacks to the ArcaneDoor threat actor but sees no evidence of broader breaches.
