Cisco’s Zero-Day Drama: When Firewalls Need a Firewall

In September 2025, Cisco faced a cyber “oh no” moment as sophisticated hackers, dubbed ArcaneDoor, exploited zero-day vulnerabilities in Cisco ASA and FTD software. These cyber troublemakers are going after government networks worldwide, leaving IT teams scrambling to patch and pray. The zero-day vulnerabilities are giving “patch-or-perish” a whole new meaning.

Pro Dashboard

Hot Take:

It looks like Cisco’s software has as many holes as a Swiss cheese buffet, and state-sponsored cyber actors are feasting on it. If you’re using Cisco ASA or FTD, it’s time to patch up those vulnerabilities faster than you can say ‘zero-day’ – unless, of course, you fancy the idea of a nation-state making themselves at home in your network. And let’s be honest, nobody wants a surprise international guest in their firewall!

Key Points:

  • State-sponsored actors are exploiting zero-day vulnerabilities in Cisco software.
  • The vulnerabilities are primarily targeting government networks for data theft.
  • Cisco has identified three critical vulnerabilities: CVE-2025-20333, CVE-2025-20362, and CVE-2025-20363.
  • Software updates have been released by Cisco to address these vulnerabilities.
  • The U.S. and U.K. cybersecurity agencies have issued warnings and directives.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?