Cisco’s Zero-Day Drama: When Firewalls Need a Firewall
In September 2025, Cisco faced a cyber “oh no” moment as sophisticated hackers, dubbed ArcaneDoor, exploited zero-day vulnerabilities in Cisco ASA and FTD software. These cyber troublemakers are going after government networks worldwide, leaving IT teams scrambling to patch and pray. The zero-day vulnerabilities are giving “patch-or-perish” a whole new meaning.

Hot Take:
It looks like Cisco’s software has as many holes as a Swiss cheese buffet, and state-sponsored cyber actors are feasting on it. If you’re using Cisco ASA or FTD, it’s time to patch up those vulnerabilities faster than you can say ‘zero-day’ – unless, of course, you fancy the idea of a nation-state making themselves at home in your network. And let’s be honest, nobody wants a surprise international guest in their firewall!
Key Points:
- State-sponsored actors are exploiting zero-day vulnerabilities in Cisco software.
- The vulnerabilities are primarily targeting government networks for data theft.
- Cisco has identified three critical vulnerabilities: CVE-2025-20333, CVE-2025-20362, and CVE-2025-20363.
- Software updates have been released by Cisco to address these vulnerabilities.
- The U.S. and U.K. cybersecurity agencies have issued warnings and directives.