Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

Around 50,000 Cisco firewalls are vulnerable to attack, so patch now

Best free Linux firewalls.
  • 50,000 Cisco firewalls vulnerable to actively exploited RCE flaws CVE-2025-20333 and 20362
  • Cisco and CISA urge immediate patching; no workarounds available for affected ASA/FTD devices
  • Shadowserver found 48.8K unpatched IPs; top affected countries include USA, UK, and Germany

Around 50,000 internet-connected Cisco firewalls are vulnerable to two actively exploited flaws, granting threat actors unauthenticated remote code execution (RCE), as well as full control over compromised devices.

Cisco recently released patches for CVE-2025-20333 and CVE-2025-20362, two bugs plaguing its Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) solutions.

The former is a buffer overflow vulnerability with a 9.9/10 (critical) severity score, while the latter is a missing authorization flaw with a 6.5/10 (medium) severity score.

USA most affected

In the security advisory, Cisco urged customers to apply the patch as soon as possible, stating that it is aware of “attempted exploitation” in the wild.

“Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability,” it said.

At the same time, The Shadowserver Foundation, a nonprofit global cybersecurity data organization, shared on X that as of September 30, there are almost 50,000 exposed endpoints:

“Attention! Cisco ASA/FTD CVE-2025-20333 & CVE-2025-20362 incidents: we are now sharing daily vulnerable Cisco ASA/FTD instances in our Vulnerable HTTP reporting. Over 48.8K unpatched IPs found on 2025-09-29. Top affected: USA,” the tweet reads. At press time, the US had 19,610 exposed instances, followed by the UK with 2,834, and Germany with 2,392.

Right now, the best way to mitigate the threat is to apply the patch, especially since there are no workarounds. BleepingComputer reported temporary hardening steps could include restricting VPN web interface exposure, and increasing logging and monitoring for suspicious VPN logins and crafted HTTP requests.

The US Cybersecurity and Infrastructure Security Agency (CISA) recently urged government agencies to address these two flaws, claiming they were being actively exploited.

As per Emergency Directive 25-03, published on September 25, 2025, CISA said there is a “widespread” attack campaign targeting Cisco Adaptive Appliances and Firepower firewall devices.

Via BleepingComputer

You might also like

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.