Skip to content

Cisco ASA Active Exploitation - 20250926001

Overview

Important Note: This is distinct from our previous advisory on Cisco IOS, IOS XE, and Meraki published on 25 September 2025.

Cisco has published an event responce advisory regarding their engagement with multiple government agencies. This investigation was regarding attacks that were targeting certain Cisco Adaptive Security Appliance (ASA) 5500-X Series devices that were running Cisco Secure Firewall ASA Software with VPN web services enabled to implant malware, execute commands, and potentially exfiltrate data from the compromised devices.

What is vulnerable?

This vulnerability affects Cisco devices if they are running a vulnerable release of Cisco Secure Firewall ASA Software or Cisco Secure FTD Software and have one or more of the vulnerable configurations.

Affected Product(s) and Version(s) CVE CVSS Severity
Vendor listed affected products and configurations CVE-2025-20333
CVE-2025-20363
CVE-2025-20362 
9.9
9.0
6.5
Critical
Critical
Medium

What has been observed?

Cisco reports active exploitation of these vulnerabilities has been observed globally. The Australian Signals Directorate (ASD) has published an advisory on this activity intended for business owners and technical IT support services. The WASOC has not received any reports of exploitation of this vulnerability on Western Australian Government networks at the time of writing.

Recommendation

The WASOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframes (refer Patch Management):