Cisco: Actively exploited firewall flaws now abused for DoS attacks

Cisco: Actively exploited firewall flaws now abused for DoS attacks

Cisco has issued security updates addressing two vulnerabilities exploited in zero-day attacks that cause ASA and FTD firewalls to reboot. These vulnerabilities, when chained, can allow attackers complete control over affected systems. #CVE202520362 #CVE202520333

Keypoints

  • Cisco warned about two critical vulnerabilities being exploited in zero-day attacks targeting ASA and FTD firewalls.
  • The vulnerabilities can be chained to allow remote, unauthenticated attackers to gain full control over affected devices.
  • U.S. federal agencies were ordered by CISA to secure their Cisco firewalls within 24 hours and disconnect end-of-support devices.
  • Over 34,000 vulnerable internet-exposed Cisco firewalls are currently tracked by Shadowserver, a decrease from previous counts.
  • Recent attacks linked to the ArcaneDoor campaign exploited multiple zero-day vulnerabilities in Cisco firewalls.

Read More: https://www.bleepingcomputer.com/news/security/cisco-actively-exploited-firewall-flaws-now-abused-for-dos-attacks/