What happened
Amazon security researchers have identified active attacks exploiting known vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) devices. Threat actors are using these flaws to gain unauthorized access to corporate networks, potentially enabling data theft or disruption of security operations.
Who is affected
Organizations using unpatched Cisco ASA or FTD devices are at immediate risk. The exploited vulnerabilities primarily affect enterprises relying on these firewalls for perimeter defense and VPN connectivity.
Why CISOs should care
Firewall vulnerabilities remain a critical vector for intrusion and lateral movement. The Amazon findings show how attackers continue to target network infrastructure devices that often lack timely patching and visibility, exposing even mature security environments to compromise.
3 practical actions
- Apply Cisco’s latest security updates for ASA and FTD devices without delay.
- Audit firewall configurations and VPN access to identify suspicious connections or privilege misuse.
- Implement continuous network monitoring for signs of exploitation, including unusual traffic patterns or failed authentication attempts.
