Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      Epic Games Adds Inflation To In-Game Currency

      April 16, 2026

      Starlink Outage Reveals Military Dependence on SpaceX

      April 16, 2026

      The Gaming World as of April 2026

      April 15, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        Starlink Outage Reveals Military Dependence on SpaceX

        April 16, 2026

        The Gaming World as of April 2026

        April 15, 2026

        Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

        April 15, 2026

        NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

        April 8, 2026

        OpenAI Expands Influence With Strategic TBPN Media Acquisition

        April 8, 2026
      • AI

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        The Rise Of Agentic AI Signals A Shift From Tools To Autonomous Digital Actors

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Ai-Powered Startup Signals Rise Of One-Person Billion-Dollar Companies

        April 8, 2026

        OpenAI Secures Historic $122 Billion Funding Round at $852 Billion Valuation

        April 7, 2026
      • Security

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        DeFi Platform Drift Halts Operations After Multi-Million Dollar Crypto Hack

        April 7, 2026

        Fake WhatsApp App Exposes Users To Government Spyware Operation

        April 7, 2026

        ICE Deploys Controversial Spyware Tool In Drug Trafficking Investigations

        April 7, 2026

        Telehealth Firm Discloses Breach Amid Rising Digital Health Vulnerabilities

        April 6, 2026
      • Health

        European Crackdown Targets Social Media’s Impact on Children

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Australia Moves To Curb Social Media Addiction Among Youth With Expanded Under-16 Ban

        April 5, 2026

        Australia’s eSafety Regulator Warns Big Tech As Teens Circumvent Social Media Restrictions

        April 5, 2026

        Meta Finally Held Accountable For Harming Teens, But Real Reform Remains Uncertain

        April 2, 2026
      • Science

        Starlink Outage Reveals Military Dependence on SpaceX

        April 16, 2026

        Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

        April 15, 2026

        Artemis II Splashdown Signals A Step Closer to Mass Space Travel

        April 12, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026
      • Tech

        Starlink Outage Reveals Military Dependence on SpaceX

        April 16, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        Zuckerberg Quietly Offers Musk Support As Tech Titans Align Around Government Power

        April 4, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Another Billionaire Signals Exit As California’s Taxes Drives Out High-Profile Entrepreneurs

        March 28, 2026
      TallwireTallwire
      Home»Tech»Federal Agencies Urged to Patch Cisco Firewalls Amid Active Exploitation
      Tech

      Federal Agencies Urged to Patch Cisco Firewalls Amid Active Exploitation

      5 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      Federal Agencies Urged to Patch Cisco Firewalls Amid Active Exploitation
      Federal Agencies Urged to Patch Cisco Firewalls Amid Active Exploitation
      Share
      Facebook Twitter LinkedIn Pinterest Email

      A sharp warning has been issued by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to federal agencies: two critical vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Firepower devices—CVE-2025-20333 (remote code execution) and CVE-2025-20362 (privilege escalation)—are being actively exploited by threat actors, yet many agencies that reported systems as “patched” are still running insecure versions. According to reports, the agency found devices that had been updated but not to a version that corrects the vulnerability, and continues to track thousands of internet-connected devices still at risk. CISA’s Emergency Directive 25-03 mandated the fixes and additional forensic procedures, stressing that federal agencies must update all ASA and Firepower devices—not just those exposed to the internet—and verify compliance immediately.

      Sources: Bleeping Computer, HelpNet Security

      Key Takeaways

      – Federal agencies remain vulnerable despite patch-reports: CISA found devices labeled “patched” that still run software versions open to exploitation.

      – Two major vulnerabilities in Cisco ASA/Firepower gear—one allowing remote code execution, the other privilege escalation—are being exploited in real‐world campaigns.

      – CISA’s directive demands full coverage—including internal devices, not only public-facing firewalls—and mandates forensic action, version verification, and potential device decommissioning where patches cannot be applied.

      In-Depth

      The federal government has been put on high alert by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) after discovering that multiple civilian agencies remain exposed to two serious flaws in Cisco firewall hardware and software, even after receiving clear instructions to patch them. The vulnerabilities—tracked as CVE-2025-20333 (remote code execution) and CVE-2025-20362 (privilege escalation)—are especially dangerous when chained, because an attacker gaining access via CVE-20362 can then exploit CVE-20333 to achieve full control of the device. Security firm research links the campaign exploiting them to the long-running “ArcaneDoor” group.

      CISA’s Emergency Directive 25-03, originally issued in late September, required agencies using Cisco ASA or Firepower devices to immediately update to fixed versions, conduct forensic activity, disconnect compromised gear, and report status. However, the update this week from CISA makes one thing very clear: the job is not done. Some agencies delivered status updates claiming “patched” devices, yet investigations reveal those devices may still run vulnerable software versions or may not have been subjected to full forensic verification. In effect, the sticker “patched” is not equal to “secure.”

      Further compounding the risk: the vulnerabilities are not limited to the devices facing the public internet. Internal devices, VPN-backhaul endpoints, and other firewall equipment isolated from external traffic are still in scope. CISA emphasizes that all devices—public or internal—need attention. The practical challenge is significant: many federal systems run older hardware, or software versions that must be updated via special-release channels, and some still run firewalls at or beyond vendor support end-dates. One recent industry bulletin noted that more than 30,000 Cisco ASA/Firepower devices remain vulnerable online.

      From a conservative security posture, the implications are stark. Agencies entrusted with some of the nation’s most sensitive data remain exposed to infiltration via perimeter devices—precisely the equipment meant to be a first line of defense. A breach of a firewall doesn’t just mean stolen data; it could mean attacker persistence, lateral movement, and undetected exfiltration for months. The fact that agencies may have ticked the “patch applied” box without verifying versions or conducting forensic checks undermines the credibility of patch-compliance reporting.

      To illustrate: suppose a federal agency applied a software update, but it installed version 9.12.4.70 instead of the required 9.12.4.72 (the fixed release). Even though the patch was applied, the device remains vulnerable. Because of real-world exploits, CISA recommends agencies also execute “core dump and hunt” instructions to look for signs of compromise—such as modified ROMMON (bootloader) code or disabled logging—especially vital because attackers may persist through reboots and upgrades.

      What should agencies (and indeed any organization using similar gear) do now? First, compile an inventory of all ASA and Firepower devices, including those not facing the public internet. Second, confirm the exact software version and patch level against Cisco’s advisories and CISA’s version-tables. Third, run the forensic procedures provided by CISA to detect signs of compromise; if detected, isolate or decommission as needed. Fourth, consider device replacement if hardware is end-of-life or cannot be upgraded to a safe version. Fifth, document everything both for internal compliance and for oversight purposes—especially given the federal government’s accountability protocols.

      On the broader front, this situation underscores a recurring theme in government cybersecurity: issuing directives is only the first step; enforcing compliance and verifying outcomes is where the real work lies. From a policy and governance perspective, this incident reinforces the need for tighter vendor-support lifecycle management, continuity planning for critical security appliances, and stronger mechanisms to ensure patching isn’t just reported, but validated. For national security, the stakes are high: the adversaries targeting these flaws are real, sophisticated, and persistent.

      In short, this is not a classic “apply patch and forget” moment—it’s a reminder that in cybersecurity, the “final mile” of verifying full remediation is where too many organizations falter. Federal agencies must now move from “patch applied” to “patch validated and device cleared.” The private sector should take note: if the federal government can struggle with this, chances are many smaller organizations are in even greater peril. Vigilance, verification, and remediated device hygiene are non-negotiable.

      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticleFed Chair Powell Asserts AI Spending Isn’t a Bubble — Despite Rising Warnings
      Next Article Federal Court Finds Meta Not an Illegal Monopoly

      Related Posts

      Starlink Outage Reveals Military Dependence on SpaceX

      April 16, 2026

      The Gaming World as of April 2026

      April 15, 2026

      Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

      April 15, 2026

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      Starlink Outage Reveals Military Dependence on SpaceX

      April 16, 2026

      The Gaming World as of April 2026

      April 15, 2026

      Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

      April 15, 2026

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026
      Popular Topics
      Series B Satya Nadella Tesla Cybertruck Startup Stocks Sundar Pichai spotlight Taiwan Tech Software starlink Tim Cook trending SpaceX Samsung Series A UAE Tech Space Satellite Tesla Viral
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.