Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense
The ArcaneDoor threat actor has developed a persistence mechanism that resides in the FXOS firmware layer of Cisco Secure Firewall ASA and FTD installations. This backdoor is preserved across firmware upgrades to versions patched in September 2025, meaning systems that were compromised before that date remain vulnerable even after applying security patches. The initial compromise vector was CVE-2025-20333 (VPN Web Server RCE) or CVE-2025-20362 (VPN Unauthorized Access), but once the persistence mechanism is in place, the attacker retains access through the firmware layer.
- Initial compromise via CVE-2025-20333 (VPN RCE) or CVE-2025-20362 (VPN unauthorized access)
- Network access to the firewall's VPN web server interface
- Firewall must be running vulnerable ASA/FTD software versions prior to September 2025 patches
Patching may require device reboot — plan for process interruption
/api/v1/advisories/44d38c7a-38bf-459a-aa2d-1835528e5a0bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.