Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense

cisco-sa-asaftd-persist-CISAED25-03 · Informational · Published · Updated

On April 23, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an update to V1: Emergency Directive (ED) 25-03: Identify and Mitigate Potential Compromise of Cisco Devices related to Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD) products. According to the update, the ArcaneDoor threat actor has developed a previously unknown persistence mechanism that is preserved across upgrading to the fixed releases that were published in September 2025. This persistence mechanism resides in the Cisco Firepower eXtensible Operating System (FXOS) Software base operating system for Cisco Secure Firewall ASA Software and Cisco Secure FTD Software installations on the affected hardware platforms. Note: According to the intelligence Cisco PSIRT has received to date, the initial compromise, begins with the attacker exploiting the following vulnerabilities before customers upgraded to the fixed releases that were made available in September 2025: CVE-2025-20333: Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability CVE-2025-20362: Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability For more information about the fixed releases that were made available in September 2025, see Cisco Event Response: Continued Attacks Against Cisco Firewalls. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-CISAED25-03

Cisco advisory · CSAF JSON

Workarounds

To fully remove the persistence mechanism, Cisco strongly recommends reimaging and upgrading the device using the fixed releases that are listed in the Fixed Software ["#fs"] section of this advisory. For more information, see the reimaging documentation for the specific product:

Cisco Secure Firewall ASA and Threat Defense Reimage Guide ["https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/reimage/asa-ftd-reimage.html"]
Perform a Complete Reimage for FXOS in Firepower 4100 and 9300 Series ["https://www.cisco.com/c/en/us/support/docs/security/firepower-9300-series/220603-perform-a-complete-reimage-for-fxos-in-f.html"]
Reimage a Secure FTD for 1000, 2100, and 3100 Series ["https://www.cisco.com/c/en/us/support/docs/security/firepower-1000-series/220642-reimage-a-secure-firewall-threat-defense.html"]

Cisco recommends reimaging and upgrading to a fixed release that is listed in the Fixed Software ["#fs"] section of this advisory.

In cases of confirmed compromise on any Cisco Secure ASA or FTD platforms, all configuration elements of the device should be considered untrusted. Cisco recommends that all configurations – especially local passwords, certificates, and keys – be reconfigured and that all certificates and keys are regenerated.

Alternative Mitigation (not recommended): The following action can mitigate this issue until reimaging can be performed:

A cold restart will remove the malicious persistent implant. The shutdown, reboot, and reload CLI commands will not clear the malicious persistent implant, the power cord must be pulled out and plugged back in the device.

Important: Disconnecting device power can risk database or disk corruption, and devices might not boot or run as expected. For this reason, Cisco strongly recommends reimaging the device instead if a compromise is suspected.

CVEsCVE-2025-20333, CVE-2025-20362
Cisco Bug IDsCSCwt61597
CVSS ScoreBase NA
Product Names From Source
NA

Related Products

Product CVE Evidence
Firepower Extensible Operating System CVE-2025-20362 Cisco OpenVuln
Firepower Extensible Operating System CVE-2025-20333 Cisco OpenVuln
Cisco Firepower Extensible Operating System (FXOS) CVE-2025-20362 Cisco OpenVuln
Cisco Firepower Extensible Operating System (FXOS) CVE-2025-20333 Cisco OpenVuln