Cisco Warns of Critical Security Flaw in Adaptive Security Appliance
Cisco Systems has issued a critical advisory regarding a significant security vulnerability affecting its Adaptive Security Appliance (ASA) and other related products, allowing unauthenticated attackers to execute arbitrary code with root privileges. The vulnerability, identified as CVE-2025-20363, carries a CVSS score of 9.0 and arises from improper validation of user-supplied input within HTTP requests. This flaw has been exploited in a series of sophisticated zero-day attacks by a threat actor identified as ArcaneDoor, suspected to be linked to a Chinese hacking group. The attacks have targeted various Cisco devices, particularly the ASA 5500-X Series, allowing malware like RayInitiator and LINE VIPER to be deployed, which can evade detection and execute malicious commands. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the U.K. National Cyber Security Centre (NCSC) have urged immediate action from organizations using these affected devices to mitigate the risk of compromise. The situation underscores the importance of timely software updates and robust security practices to safeguard critical infrastructure against increasingly advanced cyber threats.