By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362
Computing

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

News Room
Last updated: 2025/11/06 at 12:15 PM
News Room Published 6 November 2025
Share
Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362
SHARE

Nov 06, 2025Ravie LakshmananZero-Day / Vulnerability

Cisco on Wednesday disclosed that it became aware of a new attack variant that’s designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362.

“This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service (DoS) conditions,” the company said in an updated advisory, urging customers to apply the updates as soon as possible.

Both vulnerabilities were disclosed in late September 2025, but not before they were exploited as zero-day vulnerabilities in attacks delivering malware such as RayInitiator and LINE VIPER, according to the U.K. National Cyber Security Centre (NCSC).

DFIR Retainer Services

While successful exploitation of CVE-2025-20333 allows an attacker to execute arbitrary code as root using crafted HTTP requests, CVE-2025-20362 makes it possible to access a restricted URL without authentication.

The update comes as Cisco addressed two critical security flaws in Unified Contact Center Express (Unified CCX) that could permit an unauthenticated, remote attacker to upload arbitrary files, bypass authentication, execute arbitrary commands, and elevate privileges to root.

The networking equipment major credited security researcher Jahmel Harris for discovering and reporting the shortcomings. The vulnerabilities are listed below –

  • CVE-2025-20354 (CVSS score: 9.8) – A vulnerability in the Java Remote Method Invocation (RMI) process of Unified CCX that allows an attacker to upload arbitrary files and execute arbitrary commands with root permissions on an affected system.
  • CVE-2025-20358 (CVSS score: 9.4) – A vulnerability in the Contact Center Express (CCX) Editor application of Unified CCX that allows an attacker to bypass authentication and obtain administrative permissions to create arbitrary scripts on the underlying operating system and execute them.

They have been addressed in the following versions –

  • Cisco Unified CCX Release 12.5 SU3 and earlier (Fixed in 12.5 SU3 ES07)
  • Cisco Unified CCX Release 15.0 (Fixed in 15.0 ES01)
CIS Build Kits

In addition to the two vulnerabilities, Cisco has shipped patches for a high-severity DoS bug (CVE-2025-20343, CVSS score: 8.6) in Identity Services Engine (ISE) that could allow an unauthenticated, remote attacker to cause a susceptible device to restart unexpectedly.

“This vulnerability is due to a logic error when processing a RADIUS access request for a MAC address that is already a rejected endpoint,” it said. “An attacker could exploit this vulnerability by sending a specific sequence of multiple crafted RADIUS access request messages to Cisco ISE.”

While there is no evidence that any of the three security flaws have been exploited in the wild, it’s essential that users apply the updates as soon as possible for optimal protection.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Celonis’s presence increases in the life science industry –  News Celonis’s presence increases in the life science industry – News
Next Article What does the tech industry think about Labour? – UKTN What does the tech industry think about Labour? – UKTN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Pebblebee’s new Find Hub trackers add wireless charging and limited-edition colors
Pebblebee’s new Find Hub trackers add wireless charging and limited-edition colors
News
iOS 26.2 new features, App Store on web, Gemini Siri deal confirmed – 9to5Mac
iOS 26.2 new features, App Store on web, Gemini Siri deal confirmed – 9to5Mac
News
File sharing? Nope, Seattle Torrent women’s pro hockey team named for violent stream of water
File sharing? Nope, Seattle Torrent women’s pro hockey team named for violent stream of water
Computing
Amazon and Perplexity, total war with significance in the industry
Amazon and Perplexity, total war with significance in the industry
Mobile

You Might also Like

File sharing? Nope, Seattle Torrent women’s pro hockey team named for violent stream of water
Computing

File sharing? Nope, Seattle Torrent women’s pro hockey team named for violent stream of water

2 Min Read
Intel ANV Vulkan Driver Finally Exposes Pipeline Binary “VK_KHR_pipeline_binary”
Computing

Intel ANV Vulkan Driver Finally Exposes Pipeline Binary “VK_KHR_pipeline_binary”

2 Min Read
Huawei reportedly building mega facility in Shenzhen to manufacture Kirin and Ascend chips · TechNode
Computing

Huawei reportedly building mega facility in Shenzhen to manufacture Kirin and Ascend chips · TechNode

1 Min Read
Accrue’s growing agent network for stablecoins payments across Africa 
Computing

Accrue’s growing agent network for stablecoins payments across Africa 

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?