Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/19/51/79/19517980-623d-a101-fa44-1c726ad86c65/mza_12095998176625063391.jpeg/600x600bb.jpg
IT SPARC Cast
John Barger
115 episodes
2 days ago
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Tech News
Technology,
News,
News Commentary
RSS
All content for IT SPARC Cast is the property of John Barger and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Tech News
Technology,
News,
News Commentary
https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1763133176250-26343665-61c6-47ec-8d87-183e1d137fa4.jpeg
Cisco CVE Double Feature: ASA Firewall RCE + ISE Root Takeover (CVE-2025-20333, CVE-2025-20362, CVE-2025-20337)
IT SPARC Cast
11 minutes 40 seconds
1 week ago
Cisco CVE Double Feature: ASA Firewall RCE + ISE Root Takeover (CVE-2025-20333, CVE-2025-20362, CVE-2025-20337)

In this week’s IT SPARC Cast, John and Lou break down a Cisco security double feature—three critical vulnerabilities impacting Cisco ASA, Cisco Secure Firewall (FTD), and Cisco Identity Services Engine (ISE). These flaws include authentication bypass, chained remote code execution, and a CVSS 10.0 root-level compromise via an undocumented ISE API.


We explain how CVE-2025-20333, CVE-2025-20362, and the newly revealed CVE-2025-20337 work, why federal agencies issued emergency patch directives, and what immediate mitigation steps enterprise defenders must take. If you manage Cisco firewalls or identity systems, this episode is mandatory listening.


00:00 - Intro


01:05 - CVEs of the Week – Cisco ASA & FTD (CVE-2025-20333 & CVE-2025-20362)


• Two actively exploited Cisco firewall vulnerabilities enable authentication bypass and chained remote code execution.

• Attackers linked to ArcaneDoor/Storm-1849 are using CVE-2025-20362 to bypass authentication, paired with CVE-2025-20333 for full RCE device takeover.

• Compromised devices show unexpected reloads, disabled logs, and firmware persistence via ROMMON modification.

• Over 50,000 ASA/FTD systems remain exposed, many still unpatched.

• Emergency guidance from CISA and NCSC stresses immediate patching, disabling WebVPN/SSL, IP whitelisting, and checking for persistence or odd CLI behavior.

• Lou and John emphasize the need for a multi-vendor firewall strategy to avoid single-vendor blast-radius failures.


⸻


05:00 - Cisco ISE – CVE-2025-20337 (Root-Level RCE via Undocumented API)


• Amazon’s threat intelligence team discovered in-the-wild exploitation of an undocumented ISE API endpoint.

• This CVSS 10.0 vulnerability allows deserialization attacks leading to unauthenticated root-level access.

• Attackers deploy an advanced, stealthy web-shell (“IdentityAuditAction”) featuring:

– In-memory execution

– Java reflection thread injection

– Custom DES-encrypted C2

– No disk artifacts

• Exploitation activity dates back to at least May and may be earlier.

• Mitigation requires updating to patched ISE versions, segmenting management networks, monitoring unexpected listeners, and tightening inbound firewall policies.

• John and Lou reiterate that identity remains the “universal attack surface,” and poor segmentation continues to amplify enterprise risk.


⸻


09:26 - Listener Feedback


A viewer asked whether the F5 BIG-IP source code leak affects only the management plane or the data plane.

Answer: Both. Because the entire codebase was leaked, any subsystem could harbor latent zero-day attack surfaces—further stressing the importance of aggressive patching and hardened segmentation.


⸻


10:28 - Wrap Up


We appreciate every question, comment, and suggestion. Keep them coming.


IT SPARC Cast

@ITSPARCCast on X

https://www.linkedin.com/company/sparc-sales/ on LinkedIn


John Barger

@john_Video on X

https://www.linkedin.com/in/johnbarger/ on LinkedIn


Lou Schmidt

@loudoggeek on X

https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn


Hosted on Acast. See acast.com/privacy for more information.

IT SPARC Cast
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.