Executive Summary
Organizations worldwide face an unprecedented wave of actively exploited vulnerabilities affecting critical network infrastructure from major cybersecurity vendors. As of November 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple high-severity vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, with threat actors demonstrating sophisticated exploitation techniques against Fortinet FortiWeb, Cisco ASA/FTD firewalls, VMware Aria Operations, and WatchGuard Firebox devices.
The Ransomware-as-a-Service Ecosystem in Late 2025: From LockBit’s Disruption to the Rise of Qilin, Akira, and DragonForceThe ransomware landscape has undergone a dramatic transformation throughout 2025, with law enforcement disruptions creating both chaos and opportunity within the cybercriminal ecosystem. While Operation Cronos dismantled LockBit’s infrastructure in early 2024, the void left by the once-dominant group has spawned a more fragmented, competitive, and paradoxically more dangerous threat
Breached CompanyBreached Company
These vulnerabilities are not theoretical risks—they are being weaponized in active attack campaigns, with some linked to state-sponsored threat actors. Federal agencies face strict remediation deadlines, and private sector organizations must act immediately to protect their infrastructure.
Current Threat Landscape: November 2025
Attack Volume and Scope
The cybersecurity community is witnessing an alarming escalation in vulnerability exploitation:
- Over 54,000 vulnerable WatchGuard Firebox devices exposed globally as of November 12, 2025
- Approximately 48,000 unpatched Cisco ASA/FTD appliances remain internet-facing despite repeated warnings
- Active exploitation confirmed across all major vendor platforms within days of patch releases
- State-sponsored threat actors (UAT4356/Storm-1849) linked to sophisticated attack campaigns
Critical Vulnerabilities Under Active Exploitation
1. Fortinet FortiWeb Authentication Bypass (CVE-2025-64446)
Severity: Critical (CVSS 9.1) Status: Actively exploited since October 2025 CISA KEV Added: November 14, 2025 Remediation Deadline: November 21, 2025
Vulnerability Details
Fortinet FortiWeb web application firewalls contain a critical path traversal vulnerability that allows unauthenticated attackers to execute administrative commands on vulnerable systems. The flaw affects multiple FortiWeb versions:
- FortiWeb 8.0.0 through 8.0.1
- FortiWeb 7.6.0 through 7.6.4
- FortiWeb 7.4.0 through 7.4.9
- FortiWeb 7.2.0 through 7.2.11
- FortiWeb 7.0.0 through 7.0.11
Attack Methodology
Attackers exploit this vulnerability by sending specially crafted HTTP POST requests to vulnerable endpoints:
POST /api/v2.0/cmdb/system/admin?/../../../../../cgi-bin/fwbcgi HTTP/1.1
This path traversal technique bypasses authentication controls, allowing threat actors to create new administrative accounts with full device control. Security researchers observed exploitation attempts as early as October 6, 2025, with public proof-of-concept code accelerating attack activity.
Impact Assessment
Successful exploitation enables attackers to:
- Gain complete administrative control over FortiWeb devices
- Modify security policies and firewall rules
- Intercept and manipulate web application traffic
- Establish persistent backdoor access
- Disable logging mechanisms to cover their tracks
Immediate Actions Required
Upgrade to patched versions immediately:
- FortiWeb 8.0.2 or later
- FortiWeb 7.6.5 or later
- FortiWeb 7.4.10 or later
- FortiWeb 7.2.12 or later
- FortiWeb 7.0.12 or later
Temporary mitigation if patching is not immediately possible:
- Disable HTTP/HTTPS access on internet-facing management interfaces
- Restrict management interface access to internal networks only
- Monitor for unauthorized administrative account creation
Incident response activities:
- Review all administrative accounts for unauthorized additions
- Examine logs for suspicious API calls to
/api/v2.0/cmdb/system/admin - Check for base64-encoded CGIINFO headers in HTTP requests
- Investigate any unexpected system reboots or configuration changes
2. Cisco ASA/FTD Critical Vulnerability Chain (CVE-2025-20333, CVE-2025-20362)
Severity: Critical (CVE-2025-20333: CVSS 9.9, CVE-2025-20362: CVSS 8.1) Status: Exploited as zero-days since May 2025 CISA Emergency Directive: ED 25-03 issued September 25, 2025 Attribution: UAT4356/Storm-1849 (China-linked threat actor)
Vulnerability Chain Breakdown
These vulnerabilities represent a sophisticated exploit chain targeting Cisco’s flagship firewall products:
CVE-2025-20362: Missing Authorization (Authentication Bypass)
- Allows unauthenticated remote attackers to access restricted URL endpoints
- Stems from a path traversal vulnerability in path normalization
- Functions as a patch bypass for the older CVE-2018-0296 vulnerability
- Enables access to administrative functions without credentials
CVE-2025-20333: Buffer Overflow (Remote Code Execution)
- Heap-based buffer overflow in Lua endpoint processing
- Originally required VPN user credentials but can be chained with CVE-2025-20362 for unauthenticated exploitation
- Allows arbitrary code execution as root user
- Results in complete device compromise
Affected Cisco Products and Versions
Cisco ASA Software:
- 9.12 – versions prior to 9.12.4.72
- 9.14 – versions prior to 9.14.4.28
- 9.16 – versions prior to 9.16.4.85
- 9.17 – versions prior to 9.17.1.45
- 9.18 – versions prior to 9.18.4.67
- 9.19 – versions prior to 9.19.1.42
Cisco Secure Firewall Threat Defense (FTD):
- Multiple versions across the 7.x branch
Vulnerable Configurations:
- IKEv2 Remote Access VPN enabled
- Mobile User Security enabled
- SSL VPN services enabled
- Devices with VPN web services accessible
Attack Campaign Analysis
The threat actor UAT4356/Storm-1849, responsible for the 2024 ArcaneDoor campaign, has been actively exploiting these vulnerabilities since May 2025. The sophisticated attack methodology includes:
Initial Access:
- Exploitation of CVE-2025-20362 for authentication bypass
- Targeting of Cisco ASA 5500-X Series devices
Exploitation and Privilege Escalation:
- Chaining with CVE-2025-20333 for remote code execution
- Deployment of Line VIPER shellcode for arbitrary command execution
- Elevation to root-level privileges
Persistence Mechanisms:
- Installation of RayInitiator bootkit in ROMMON firmware
- Firmware-level persistence that survives reboots and updates
- Systematic disabling of logging mechanisms
Post-Exploitation Activities:
- Packet capture and traffic analysis
- Configuration file exfiltration
- Backdoor account creation
- Command-and-control communication via WebVPN/HTTPS or ICMP channels
Defensive Evasion:
- Suppression of specific syslog IDs
- Forced device reboots to clear evidence
- CLI command interception to erase activity traces
Critical Issue: False Sense of Security
CISA issued updated guidance on November 13, 2025, revealing a concerning discovery: many federal agencies reported devices as “patched” when they had actually updated to software versions that remained vulnerable. This highlights the complexity of properly remediating these vulnerabilities and the need for verification of applied patches.
Comprehensive Remediation Strategy
Immediate Actions:
Identify all affected Cisco ASA and FTD devices
- Compile complete inventory of all versions and configurations
- Prioritize internet-facing and VPN-enabled systems
Apply vendor patches urgently
- Upgrade to the latest fixed releases listed in Cisco’s security advisory
- Verify patch application by checking software version numbers
- Customers on 9.17 and 9.19 branches must migrate to fixed releases
- Customers on 7.1 and 7.3 FTD branches must migrate to address all vulnerabilities
Collect forensic evidence per CISA directive
- Transmit memory files to CISA for forensic analysis (federal agencies)
- Preserve core dumps and crash reports
- Document all suspicious activity
Detection and Incident Response:
Search for indicators of compromise:
- Review logs for unauthorized administrative account creation
- Check for unexpected ROMMON modifications
- Identify gaps in logging or disabled security features
- Examine configuration files for unauthorized changes
Implement enhanced monitoring:
- Enable detailed logging on all management interfaces
- Monitor for POST requests to suspicious endpoints
- Track authentication bypass attempts
- Set up alerts for unusual privilege escalation activities
Follow CISA supplemental guidance:
- Review ED 25-03 core dump and hunt instructions
- Implement recommended detection queries
- Coordinate with CISA for federal agency support
Long-term Security Improvements:
Network segmentation:
- Remove management interfaces from internet exposure
- Implement jump box architecture for administrative access
- Restrict VPN web services to authorized IP ranges
Configuration hardening:
- Disable unused VPN protocols and services
- Implement multi-factor authentication for all administrative access
- Review and minimize enabled management protocols
3. VMware Aria Operations Privilege Escalation (CVE-2025-41244)
Severity: High (CVSS 7.8) Status: Actively exploited in the wild CISA KEV Added: October 30, 2025 Attribution: Chinese threat actors (per NVISO reporting)
Vulnerability Overview
VMware Aria Operations and VMware Tools contain a privilege defined with unsafe actions vulnerability that allows local privilege escalation to root on affected virtual machines. This vulnerability has been under active exploitation for approximately one year before public disclosure.
Technical Details
Affected Products:
- VMware Aria Operations (various versions)
- VMware Tools when managed by Aria Operations with SDMP enabled
Attack Requirements:
- Malicious local actor with non-administrative privileges
- Access to a VM with VMware Tools installed
- VM managed by Aria Operations with SDMP (Self-Driving Operations Platform) enabled
Exploitation Impact:
- Privilege escalation from low-privileged user to root
- Complete control over the affected virtual machine
- Potential for lateral movement across virtual infrastructure
Remediation Steps
Apply Broadcom security updates immediately
- Update to the latest versions per Broadcom advisory 36149
- Prioritize systems with SDMP enabled
Review SDMP configurations
- Assess which VMs have SDMP enabled
- Evaluate necessity of SDMP on production systems
- Consider disabling SDMP on non-critical systems until patched
Implement compensating controls:
- Enhance monitoring of privilege escalation attempts
- Restrict local user access to sensitive VMs
- Implement application whitelisting where feasible
Threat hunting activities:
- Review logs for unexpected privilege escalation
- Check for suspicious root-level activities on managed VMs
- Investigate unauthorized administrative actions
Strategic Implications
The year-long exploitation window before disclosure highlights the importance of:
- Proactive threat hunting within virtual infrastructure
- Regular security assessments of virtualization management tools
- Defense-in-depth strategies that don’t rely solely on hypervisor security
4. WatchGuard Firebox Remote Code Execution (CVE-2025-9242)
Severity: Critical (CVSS 9.3) Status: Actively exploited in the wild CISA KEV Added: November 13, 2025 Remediation Deadline: December 3, 2025
Vulnerability Characteristics
WatchGuard Firebox devices contain an out-of-bounds write vulnerability in the OS iked process, allowing remote unauthenticated attackers to execute arbitrary code. This represents a classic buffer overflow vulnerability in 2025—demonstrating that fundamental security issues continue to plague enterprise-grade network appliances.
Affected Systems
Vulnerable Fireware OS Versions:
- 11.10.2 through 11.12.4_Update1
- 12.0 through 12.11.3
- 2025.1
Vulnerable Configurations:
- Mobile user VPN with IKEv2 enabled
- Branch office VPN using IKEv2 with dynamic gateway peer
- Previous IKEv2 configurations may leave devices vulnerable even if deleted
Global Exposure Assessment
According to Shadowserver Foundation scanning data:
- 54,300+ vulnerable Firebox devices exposed globally as of November 12, 2025
- 18,500 devices in the United States represent the largest concentration
- Additional major concentrations: Italy (5,400), UK (4,000), Germany (3,600), Canada (3,000)
- Vulnerability count decreased from peak of 75,955 on October 19, 2025
Attack Mechanism
The vulnerability stems from a missing length check on an identification buffer during the IKE handshake process. Attackers can:
- Send crafted IKE_AUTH request messages with abnormally large IDi payload sizes (>100 bytes)
- Trigger out-of-bounds write conditions in memory
- Execute arbitrary code with system privileges
- Maintain persistence across reboots
Indicators of Attack (IoAs)
WatchGuard provides specific indicators for detection:
Strong Indicator:
- IKE_AUTH request messages with IDi payload size greater than 100 bytes
Example log entry pattern:
iked (203.0.113.1<->203.0.113.2)"IKE_AUTH request" message has 6 payloads [ IDi(sz=300) CERT(sz=889) SA(sz=44) TSi(sz=24) TSr(sz=24) N(sz=8)]
Weak Indicators:
- iked process crashes generating fault reports
- VPN connection interruptions
- iked process hangs after connection attempts
Comprehensive Remediation Plan
Phase 1: Immediate Patching (Priority)
Identify affected devices:
- Inventory all WatchGuard Firebox appliances
- Determine current Fireware OS versions
- Identify devices with IKEv2 configurations
Apply security updates:
- Upgrade to latest Fireware OS releases
- Verify patch installation success
- Test VPN functionality post-patch
Temporary mitigation if patching not immediately possible:
- Disable IKEv2 VPN configurations
- Restrict management interface access
- Implement compensating network controls
Phase 2: Security Assessment and Hardening
Rotate credentials and secrets:
- Follow WatchGuard best practices for rotating shared secrets
- Update all locally stored secrets on vulnerable devices
- Reset VPN credentials as precautionary measure
Enable enhanced logging:
- Set iked diagnostic logging to Info level
- Monitor for indicators of attack patterns
- Implement SIEM integration for real-time alerting
Review firewall configurations:
- Examine logs for suspicious activity during vulnerable period
- Check for unauthorized configuration changes
- Verify VPN user account legitimacy
Phase 3: Long-term Security Improvements
Network architecture review:
- Minimize internet exposure of VPN endpoints
- Implement defense-in-depth strategies
- Consider zero-trust network access alternatives
Vulnerability management program:
- Establish faster patch deployment processes
- Implement continuous vulnerability scanning
- Develop risk-based prioritization framework
Additional Recent Vulnerabilities
Microsoft Windows Kernel Privilege Escalation (CVE-2025-62215)
Severity: High (CVSS 7.0) Status: Exploited in the wild as zero-day Patched: November 2025 Patch Tuesday
This race condition vulnerability in the Windows Kernel allows local authenticated attackers to gain SYSTEM-level privileges. Microsoft confirmed active exploitation in the wild, making this the 11th Windows Kernel EoP vulnerability patched in 2025, with five exploited as zero-days.
Key Details:
- Affects all supported Windows versions
- Requires local access and authentication
- Exploitation involves winning a race condition for SYSTEM privileges
- Part of November 2025 Patch Tuesday addressing 63 CVEs
Microsoft WSUS Remote Code Execution (CVE-2025-59287)
Severity: Critical (CVSS 9.8) Status: Actively exploited in the wild Emergency Patch: October 23, 2025
Critical vulnerability in Windows Server Update Services allowing unauthenticated remote code execution. The initial October Patch Tuesday fix was incomplete, requiring an emergency out-of-band update.
Impact:
- Unauthenticated remote code execution with system privileges
- Affects core patch management infrastructure
- Exploited within hours of emergency patch release
- Enables lateral movement and network-wide compromise
XWiki Platform Remote Code Execution (CVE-2025-24893)
Severity: Critical (CVSS 9.8) Status: Actively exploited CISA KEV Added: October 30, 2025
Improper sanitization vulnerability in XWiki allowing remote code execution without authentication. Recently weaponized to deploy cryptocurrency miners.
Palo Alto Networks PAN-OS Authentication Bypass Chain (CVE-2025-0108, CVE-2024-9474, CVE-2025-0111)
Severity: High to Critical Status: Active exploitation confirmed Timeline: Exploited since November 2024
Sophisticated exploit chain affecting Palo Alto Networks firewalls:
- CVE-2025-0108: Authentication bypass in management web interface
- CVE-2024-9474: Privilege escalation to root
- CVE-2025-0111: Authenticated file read vulnerability
Threat actors have compromised thousands of firewalls globally, deploying web shells, cryptocurrency miners, and establishing persistent backdoor access.
Strategic Recommendations for Organizations
Immediate Actions (24-48 Hours)
Emergency Inventory Assessment
- Identify all devices from affected vendors
- Determine which systems are internet-facing
- Prioritize based on business criticality and exposure
Rapid Patch Deployment
- Implement emergency change control procedures
- Deploy patches to critical systems immediately
- Verify successful patch application
Threat Hunting Initiation
- Search for indicators of compromise across all potentially affected systems
- Review logs from the past 6 months for suspicious activity
- Engage incident response team if compromise suspected
Short-Term Actions (1-2 Weeks)
Security Architecture Review
- Remove unnecessary internet exposure of management interfaces
- Implement network segmentation and jump box architectures
- Strengthen authentication mechanisms (MFA, certificate-based auth)
Enhanced Monitoring Implementation
- Deploy detection rules for known attack patterns
- Integrate security devices with SIEM platforms
- Establish baseline behavior profiles for critical systems
Vulnerability Management Program Enhancement
- Accelerate patch testing and deployment processes
- Implement automated vulnerability scanning
- Establish clear escalation procedures for critical vulnerabilities
Long-Term Strategic Initiatives
Zero Trust Architecture Adoption
- Evaluate zero trust network access (ZTNA) solutions
- Implement principle of least privilege across infrastructure
- Deploy continuous verification mechanisms
Threat Intelligence Integration
- Subscribe to vendor security advisories and threat intelligence feeds
- Participate in information sharing organizations (ISACs)
- Integrate threat intelligence with vulnerability management
Security Operations Maturity
- Invest in security orchestration, automation, and response (SOAR) capabilities
- Develop playbooks for rapid vulnerability response
- Conduct regular tabletop exercises for critical scenarios
Third-Party Risk Management
- Assess security posture of critical vendors
- Establish contractual requirements for timely security updates
- Develop contingency plans for vendor security failures
Indicators of Compromise (IOCs) and Detection Guidance
Fortinet FortiWeb (CVE-2025-64446)
Network Indicators:
POST /api/v2.0/cmdb/system/admin?/../../../../../cgi-bin/fwbcgi HTTP/1.1
Behavioral Indicators:
- Unexpected administrative account creation
- Base64-encoded CGIINFO headers in HTTP requests
- Unusual API calls to
/api/v2.0/cmdb/system/admin - Unexpected system reboots or service restarts
Log Patterns to Monitor:
- New user account additions in system logs
- Administrative command execution from unknown sources
- Modified firewall rules or security policies
Cisco ASA/FTD (CVE-2025-20333, CVE-2025-20362)
File System Indicators:
- Modified ROMMON firmware
- Presence of RayInitiator bootkit in GRUB
- Modified
linabinary (core ASA process)
Memory Indicators:
- LINE VIPER shellcode in memory
- Hooks in Linux kernel syscall table
- Modified sched_getparam function pointers
Network Indicators:
- WebVPN/HTTPS sessions with encrypted C2 communication
- ICMP traffic with unusual encryption patterns
- Raw TCP connections for C2 responses
- Victim-specific RSA keys and tokens in HTTPS traffic
Behavioral Indicators:
- Device immediately reboots when memory dump attempted
- Suppressed syslog messages (specific IDs related to AAA, configuration changes)
- Missing authentication logs for successful connections
- Gaps in logging during specific time periods
- Unexpected CLI command interceptions
- Unauthorized RADIUS, LDAP, or TACACS traffic captures
YARA Rules: Available in NCSC Malware Analysis Report
Detection Queries:
Cortex XDR query for disabled logging:
dataset = xdr_data
| filter action_evtlog_source = "Cisco ASA"
| comp count() as log_count by agent_hostname, action_evtlog_source
| alter hourly_rate = log_count / 24
| filter hourly_rate < 10
Hunt for suppressed syslog IDs:
- Syslog ID 113004 (AAA user authentication)
- Syslog ID 113005 (AAA user authorization)
- Syslog ID 113039 (Async AAA call)
- Syslog ID 717028 (CLI command logged)
- Syslog ID 717029 (Command authorization)
WatchGuard Firebox (CVE-2025-9242)
Strong Indicators:
- IKE_AUTH request messages with IDi payload size > 100 bytes
Example log pattern:
iked (203.0.113.1<->203.0.113.2)"IKE_AUTH request" message has 6 payloads [ IDi(sz=300) CERT(sz=889) SA(sz=44) TSi(sz=24) TSr(sz=24) N(sz=8)]
Weak Indicators:
- iked process crashes with fault reports
- Unexpected VPN connection interruptions
- iked process hangs after connection attempts
Configuration Review: Check for vulnerable configurations:
- Mobile user VPN with IKEv2 enabled
- Branch office VPN using IKEv2 with dynamic gateway peer
- Previously deleted IKEv2 configurations on devices with remaining static gateway peers
VMware Aria Operations (CVE-2025-41244)
Indicators:
- Unexpected privilege escalation from non-administrative users to root
- Unauthorized command execution with root privileges on VMs
- Modified VMware Tools configurations
- Suspicious SDMP (Self-Driving Operations Platform) activity
Detection Recommendations:
- Monitor for privilege escalation events in VM logs
- Review user privilege changes on managed VMs
- Audit SDMP-enabled VM configurations
- Check for unauthorized root-level activities
Microsoft Windows Kernel (CVE-2025-62215)
Indicators:
- Local privilege escalation to SYSTEM level
- Race condition exploitation attempts
- Unusual kernel-mode access patterns
General Detection Strategies
SIEM Correlation Rules:
- Multiple failed authentication attempts followed by successful access
- Administrative actions from non-standard IP addresses
- Configuration changes outside maintenance windows
- Unusual outbound connections from security appliances
- Suppressed or missing expected log entries
Threat Hunting Queries:
- Search for gaps in logs during suspicious time periods
- Correlate device reboot times with administrative actions
- Review all administrative account creations in past 6 months
- Identify devices with disabled or reduced logging levels
Forensic Evidence Collection: For Cisco ASA devices per CISA ED 25-03:
- Collect memory dumps (core dumps) before applying patches
- Preserve device configurations
- Capture network traffic logs
- Document all administrative actions and timeline
Recommended Actions:
- Implement continuous monitoring with SIEM integration
- Enable detailed logging on all management interfaces
- Deploy network intrusion detection systems (IDS/IPS)
- Establish baseline behavior profiles for critical devices
- Configure alerts for indicators listed above
- Participate in threat intelligence sharing communities
Conclusion: The Imperative for Immediate Action
The current threat landscape demands unprecedented urgency in vulnerability management. The vulnerabilities discussed in this article are not theoretical risks—they are being actively weaponized by sophisticated threat actors, including state-sponsored groups, to compromise critical infrastructure worldwide.
Key Takeaways
- Speed is Critical: Threat actors are exploiting vulnerabilities within days (sometimes hours) of patch releases. Organizations cannot afford extended testing cycles for critical security updates.
- Verification is Essential: The Cisco ASA/FTD case demonstrates that organizations must verify patch application, not just assume updates were successful.
- Defense-in-Depth is Mandatory: Patching alone is insufficient. Organizations must implement layered security controls, reduce attack surface, and enhance monitoring capabilities.
- Threat Intelligence Integration: Understanding adversary tactics, techniques, and procedures (TTPs) enables more effective defense and faster incident response.
- Continuous Improvement: The vulnerability landscape will continue to evolve. Organizations must invest in mature security operations capabilities to stay ahead of emerging threats.
Final Recommendations
For CISOs and security leaders:
- Treat CISA KEV additions as mandatory priorities requiring immediate action
- Establish executive-level visibility into vulnerability management metrics
- Invest in security operations capabilities to detect and respond to exploitation attempts
- Engage with peer organizations and information sharing communities
- Develop organizational resilience to withstand compromise of perimeter defenses
The cybersecurity community faces a persistent adversary advantage in the vulnerability lifecycle. By taking immediate action on these critical vulnerabilities and implementing strategic security improvements, organizations can significantly reduce their risk exposure and enhance their defensive posture against advanced threats.
Resources and References
CISA Known Exploited Vulnerabilities (KEV) Catalog
Main KEV Catalog:
- CISA KEV Catalog - Full Database
- KEV Catalog Resources Page
- CISA KEV - CSV Format
- CISA KEV - JSON Format
Specific CISA Alerts for Covered Vulnerabilities:
- CVE-2025-64446 (Fortinet FortiWeb) - Added November 14, 2025
- CVE-2025-20333 & CVE-2025-20362 (Cisco ASA/FTD) - Emergency Directive 25-03
- CVE-2025-41244 & CVE-2025-24893 - Added October 30, 2025
- CVE-2025-62215 (Windows Kernel) - November 2025 Update
CISA Binding Directives:
- BOD 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities
- Emergency Directive 25-03: Cisco Devices (Full Text)
- Supplemental Direction for ED 25-03: Core Dump and Hunt Instructions
National Vulnerability Database (NVD) Links
Individual CVE Records:
- CVE-2025-64446 (Fortinet FortiWeb)
- CVE-2025-20333 (Cisco ASA/FTD RCE)
- CVE-2025-20362 (Cisco ASA/FTD Auth Bypass)
- CVE-2025-41244 (VMware Aria Operations)
- CVE-2025-9242 (WatchGuard Firebox)
- CVE-2025-62215 (Windows Kernel)
- CVE-2025-59287 (Microsoft WSUS)
- CVE-2025-24893 (XWiki Platform)
Official Vendor Security Advisories
Fortinet:
Cisco:
- Cisco Security Advisory: Multiple Vulnerabilities in Cisco Secure Firewall ASA and FTD Software
- Cisco: Continued Malicious Activity Targeting Cisco ASA and FTD
- Cisco Talos Intelligence: UAT4356 Campaign Analysis
VMware/Broadcom:
- Security Advisory 36149: VMware Aria Operations and VMware Tools Privilege Escalation
- Broadcom Security Advisories Portal
WatchGuard:
Microsoft:
- Microsoft Security Response Center: CVE-2025-62215
- November 2025 Security Updates
- Microsoft WSUS CVE-2025-59287 Advisory
Threat Intelligence & Malware Analysis
UK National Cyber Security Centre (NCSC):
- Malware Analysis Report: RayInitiator & LINE VIPER (PDF)
- NCSC Alert: Cisco ASA Exploitation Campaign
- NCSC Device Security Guidance
Threat Actor Attribution & Campaign Analysis:
- UAT4356 / Storm-1849 Threat Profile (Cisco Talos)
- ArcaneDoor Campaign Overview (Unit 42)
- China-Linked APT Targeting Network Infrastructure
Security Research & Analysis:
- Rapid7 Analysis: CVE-2025-20333 & CVE-2025-20362
- Tenable Research: Cisco Zero-Days FAQ
- Zscaler ThreatLabz: Cisco Firewall Zero-Day Attacks
- watchTowr Labs: WatchGuard CVE-2025-9242 Analysis
- Qualys Analysis: Fortinet FortiWeb CVE-2025-64446
Indicators of Compromise (IOCs) & Detection Resources
Cisco ASA/FTD Campaign IOCs:
- NCSC YARA Rules for RayInitiator & LINE VIPER
- Unit 42 Cortex XDR Hunting Queries
- Malware Families: RayInitiator (bootkit), LINE VIPER (shellcode loader)
- Previous Campaign Malware: Line Runner, Line Dancer (ArcaneDoor 2024)
Detection Signatures & Rules:
Vulnerable Device Exposure Statistics:
- Shadowserver Foundation: Real-time Vulnerable Device Counts
- Censys Search: Internet-Exposed Device Discovery
- Shodan: Vulnerable System Identification
Third-Party Vulnerability Trackers
- CVEFeed CISA KEV Catalog Mirror
- VulnCheck: Vulnerability Intelligence
- GreyNoise: Exploitation Attempts Monitoring
Government & International Advisories
International Coordination:
- Canadian Centre for Cyber Security: AL25-012
- Australian Cyber Security Centre (ACSC)
- Singapore Cyber Security Agency: AL-2025-095
Additional CISA Resources:
About QSai LLC / CISO Marketplace
QSai LLC operates the CISO Marketplace ecosystem, providing virtual CISO services, offensive security assessments, incident response consulting, and comprehensive cybersecurity resources through our network of specialized platforms including breached.company, compliancehub.wiki, myprivacy.blog, scamwatchhq.com, and microsec.tools.
For vulnerability assessment services or incident response assistance, contact QSai LLC at https://www.cisomarketplace.services
Disclaimer: This article is provided for informational purposes only. Organizations should consult with qualified cybersecurity professionals and follow vendor-specific guidance for their environments. The information presented reflects the threat landscape as of November 17, 2025, and may evolve as new intelligence emerges.


