Cisco has confirmed active exploitation of multiple vulnerabilities in the VPN/web services of Cisco Secure Firewall (ASA) and FTD. Threat actors chained a missing-authorization flaw with a separate web-service buffer overflow to achieve remote code execution and deploy persistent tooling. Government partners and national CERTs have supported the investigation and issued mitigations; CISA has published Emergency Directive ED 25-03 and added the exploited CVEs to its KEV catalog.
CVE-2025-20333(9.9) is a buffer-overflow RCE in the ASA/FTD VPN web server that requires valid VPN or web credentials, making it an authenticated remote code execution flaw. In the observed campaign, attackers combined it with CVE-2025-20362 — a missing-authorization vulnerability — to abuse restricted endpoints. This chaining produced effective unauthenticated exploitation in practice, but it is important to emphasize that CVE-2025-20333 itself remains an authenticated flaw and should be treated as such for triage and exposure assessments.
CVE-2025-20362(6.5) is a missing-authorization vulnerability in the same web service family that allows access to restricted endpoints. It has been actively exploited in the wild and was a key enabler in the chaining attack observed.
CVE-2025-20363(9.0) is another web-services RCE affecting ASA/FTD as well as several IOS platforms. Cisco and other sources currently report differing CVSS values for this issue, so organizations should verify the authoritative CNA/NVD score before using it in severity assessments or publishing internal/external tables.
Operators in this campaign have deployed multi-stage tooling, including a boot-stage implant dubbed RayInitiator and a user-mode shellcode loader referred to as LINE VIPER. The UK NCSC reports that RayInitiator specifically targets ASA 5500-X series devices that do not implement Secure Boot or Trust Anchor. The models observed in attacks are either end-of-support or nearing end-of-support, and NCSC recommends replacement of these devices where possible. Importantly, ROM/ROMMON tampering has been observed only on 5500-X units lacking secure boot protections.
After compromise, attackers have exhibited behaviors aimed at both persistence and anti-forensics. These include disabling or suppressing logging, intercepting or hooking CLI commands, and deliberately triggering crashes to obstruct investigation. Additionally, they bypass VPN AAA mechanisms, establish covert C2 channels via WebVPN sessions or abnormal ICMP/raw TCP responses, and maintain persistence across reboots on susceptible platforms.
Identify exposure & isolate at-risk appliances immediately
Patch and implement vendor/CISA mitigations on an emergency basis
Hunt for compromise and ROM/boot integrity (pre- and post-patch)
Containment & recovery
Hardening & monitoring
If you are worried about any of the threats outlined in this bulletin or need help in determining what steps you should take to protect yourself from the most material threats facing your organisation, please contact your account manager, or alternatively Get in touch to find out how you can protect your organisation.