* This article was updated on September 26 to add a third vulnerability, CVE-2025-20363, patched by Cisco.
On September 25, 2025, the US Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 25-03 on two Cisco firewall vulnerabilities, noting that they have been actively exploited as zero-days.
Cisco published advisories for these vulnerabilities, tracked as CVE-2025-20333 and CVE-2025-20362, on the same day. Another critical vulnerability, CVE-2025-20363, received a patch with no public reports on exploitation noted.
The vulnerabilities affect Cisco Secure Firewall ASA and FTD software with SSL VPN or AnyConnect running vulnerable configurations and with VPN services.
Cisco’s Product Security Incident Response Team identified the flaws during a support case investigation, with assistance from multiple national cybersecurity agencies, and released fixed software for ASA and FTD platforms. No workarounds are available.
Proof-of-concept (POC) exploit code has not been publicly disclosed, but Cisco also confirmed active exploitation prior to patch release. Attackers have demonstrated capabilities to disable logging, intercept command-line interface commands, and crash devices to evade detection.
In some cases, ROMMON was modified to persist across reboots and upgrades. The worst-case scenario for CVE-2025-20333 is full device compromise with root access, while CVE-2025-20362 could allow lateral movement or reconnaissance without authentication.
Organizations should immediately upgrade to the patched versions and verify that VPN services are properly configured by referring to the Cisco Secure Firewall ASA Software Vulnerable Configurations section in the Cisco advisory. Devices nearing end-of-support should be disconnected. Agencies and enterprises should also perform forensic analysis using Cisco and CISA-provided tools to detect compromise and assess persistence mechanisms.
Threat detection configurations for VPN services should be reviewed and hardened. Patching for clients with public-facing Cisco VPN infrastructure should be prioritized; ensuring that logging and monitoring are operational. Given the nature of the exploit chain and its use in targeted campaigns, rapid response and full remediation are essential to prevent further compromise.