Critical Zero-Day Vulnerability in Cisco Firewalls Exploited, CISA Issues Emergency Directive
On September 25, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an Emergency Directive 25-03 after hackers began exploiting zero-day vulnerabilities in Cisco ASA 5500-X firewalls. Federal civilian agencies were instructed to identify affected devices, collect forensic data, apply patches, and mitigate potential compromises.
Facts
-
The directive covers Cisco Adaptive Security Appliance (ASA) and Firepower devices with web services enabled.
-
CISA added CVE-2025-20333 and CVE-2025-20362 to its Known Exploited Vulnerabilities Catalog.
-
Agencies have tight deadlines: by end of September 26, they must submit forensic memory captures, disconnect out-of-support devices, and update supported ones.
-
Cisco confirmed its investigation ties the activity to the “ArcaneDoor” campaign and urged customers to follow its mitigation steps.
Significance for Businesses
-
Firewall devices at the network edge are critical attack vectors — compromise there enables lateral movement, traffic manipulation, and persistence.
-
Many organizations, public or private, use Cisco firewalls in core or perimeter environments — those running older, unsupported devices are especially at risk.
-
Rapid response, patching, segmentation, and incident readiness are non-negotiable in modern security postures, especially with threat actors exploiting zero-days.
This directive is a stark reminder: even well-established security devices can become liabilities if left outdated or unmonitored. At DIAMATIX, we emphasize a defense-in-depth model: prompt patch management, anomaly detection, fallback architecture, and continuous vendor oversight. Relying on perimeter hardware alone is no longer sufficient — the architecture must assume compromise.
Update – September 27, 2025
Cisco has confirmed that the exploited vulnerabilities (CVE-2025-20333 and CVE-2025-20362) are part of a coordinated cyber-espionage campaign dubbed ArcaneDoor.
In response, CISA issued Emergency Directive 25-03, requiring all U.S. federal agencies by September 26, 2025 to:
-
disconnect unsupported devices,
-
apply available patches for affected platforms,
-
collect and submit forensic data for review.
Key takeaway: Firmware vulnerabilities in perimeter devices are actively leveraged by state-sponsored actors. Organizations must urgently patch, monitor logs, and review systems for signs of compromise.
Trusted · Innovative · Vigilant.




