CISA Orders Agencies to Mitigate Cisco ASA Zero-Day Exploitation
The Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive (ED) 25-03 in response to active exploitation of zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Cisco Firepower devices. The vulnerabilities, tracked as CVE-2025-20333 and CVE-2025-20362, pose a severe risk to federal networks and require immediate mitigation.
CISA confirmed an ongoing campaign by a state-sponsored threat actor exploiting Cisco ASA zero-days to gain unauthenticated remote code execution and persist through read-only memory (ROM) manipulation, even after reboots and upgrades. This campaign has been linked to the ArcaneDoor activity first identified in 2024, which demonstrated advanced firmware tampering techniques.
According to CISA, the affected vulnerabilities include:
These flaws represent an “unacceptable risk” to federal information systems.
Federal agencies must take immediate steps outlined by CISA, including:
Under 44 U.S.C. § 3553(h) and 6 U.S.C. § 655(3), the Director of CISA has the authority to issue emergency directives requiring agencies to take lawful actions to mitigate significant threats. Compliance is mandatory for all federal civilian executive branch agencies, though entities outside government are encouraged to follow the same guidance.
CISA will:
Cisco ASA appliances are widely used in federal and enterprise environments. The exploitation of ROM persistence techniques represents a major escalation, allowing attackers to survive reboots, upgrades, and common remediation steps. CISA’s directive underscores both the criticality of patch management and the urgency of coordinated federal defense against state-backed actors.