Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

U.S. Senator Bill Cassidy, Chairman of the Senate Health, Education, Labor, and Pensions (HELP) Committee, has demanded answers from Cisco Systems regarding recent zero-day vulnerabilities in its widely used networking equipment.

The October 10, 2025, letter to CEO Chuck Robbins highlights the potential risks to national security and the economy, following a swift emergency directive from the Cybersecurity and Infrastructure Security Agency (CISA).

Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

With cybercrimes costing Americans over $16 billion in 2024 alone, according to FBI estimates, the incident amplifies fears of widespread exploitation by state-sponsored actors from nations like China, Russia, and Iran.​

Cisco 0-Day Firewall Vulnerabilities

The vulnerabilities, identified as CVE-2025-20333 and CVE-2025-20362, affect Cisco’s Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) devices, enabling unauthenticated remote code execution and privilege escalation.

These flaws, exploited in a campaign linked to the ArcaneDoor threat actor since at least early 2024, allow attackers to implant persistent malware that survives reboots and upgrades by manipulating read-only memory (ROM).

CISA’s Emergency Directive 25-03, issued on September 25, 2025, mandated federal agencies to inventory all affected devices, conduct forensic analysis via core dumps, and apply patches within 24 hours or disconnect end-of-life hardware entirely.

google

Reports indicate at least one federal agency suffered a breach, prompting urgent containment measures and submissions to CISA’s malware portal by September 26.

Cassidy’s letter emphasizes Cisco’s pivotal role as the world’s largest network infrastructure provider, serving federal entities and countless businesses that rely on its tools for essential services like healthcare access and education platforms.

He warns that unaddressed flaws could disrupt operations for millions, particularly vulnerable sectors without dedicated cybersecurity leadership 45% of U.S. companies lack a Chief Information Security Officer.

The senator seeks details on whether Cisco has pinpointed threats to private customers and how it’s disseminating patches or advisories.

Further questions probe proactive communications, recommendations for upgrading outdated devices akin to CISA’s federal mandates, and targeted support for agencies like Health and Human Services, Education, and Labor.

As Cisco collaborates with federal responders, having acknowledged exploitation dating back to May 2025, the focus shifts to broader protections for non-federal users.

Small businesses, schools, and healthcare providers face heightened risks, given the devices’ ubiquity in securing remote access and VPNs.

Cassidy requires responses by October 27, 2025, to inform ongoing HELP Committee investigations into cyber defenses. Experts urge all organizations to review Cisco advisories and implement mitigations promptly to avert similar crises.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.