If you like China goes brr and cyber willy waves, today will be a good day
These are really important to patch btw, it's unauth RCE in Cisco AnyConnect/ASA and yes - zero day, despite the wording. China goes brrr, expect the interweb to get plastered with details soon. #CyberWillyWave

To find your org on .@shodan search for:

"acSamlv2Error=" "webvpnc=" "Cache-Control: no-store"

Then add org:YourOrg or ssl:YourOrg

#CyberWillyWave

25,000 IPs Scanned Cisco ASA Devices — New Vulnerability Potentially Incoming

GreyNoise observed two scanning surges against Cisco Adaptive Security Appliance (ASA) devices in late August including more than 25,000 unique IPs in a single burst. This activity represents a significant elevation above baseline, typically registering at less than 500 IPs per day.

Cisco Event Response: Continued Attacks Against Cisco Firewalls

Fixed versions, get to the ones highlighted in yellow ASAP as china goes double brr now

#CyberWillyWave

If you're on an unsupported ASA release you want to put it in the bin. If it didn't have secure boot, woops.

#CyberWillyWave

If anybody knows anybody at CISA, they have wrong/non-existent CVE on their executive order thingy, it's a typo that needs fixing. Edit: fixed.

With the Cisco blog, it reads like there is no problem.. but like, RCE vuln is RCE and still a problem.

Just because secure boot works (yay btw) doesn't mean there's no problem - of course they'll be no evidence on the box.

#CyberWillyWave

Interestingly, although the Cisco blog says the USG approached them in May 2025, the first vuln - CVE-2025-20333 - was fixed just over a year ago (around September 2024 product updates).

Another angle to that - it suggests a whole lot of orgs don't patch Cisco ASA edge devices. Which we already know from the Akira ransomware incidents -- which were using 5 year old vulns.

Just remembered I hashtagged all this #CyberWillyWave. One way to avoid being quoted in the media, unlocked!

I've identified a way to establish if a box is vulnerable to #CyberWillyWave and started internet scanning, 90k boxes in progress.

Results probably at weekend if I'm bored or early next week.

Spoiler: a lot of orgs don't patch their Cisco edge devices. To be vuln to the full chain you have to be over a year behind with updates... and most orgs are over a year behind.

Damn it, using #CyberWillyWave to hide online didn’t work

From #CyberWillyWave scanning at weekend:

45210 ASAs with WebVPN enabled
1250 ASAs patched for all three CVEs
43960 vulnerable ASAs remaining

97.24% remain vulnerable

Scans rerunning

The good news with that one btw is it's unlikely to become a thing e-crime groups exploit as it's too technically complex, it's just nation state espionage - so the operational impact should be low.

The bad news is that as e-crime groups become more rich, they may invest in AnyConnect exploits - if you paid something like $2m for an ASA exploit, you'd make it back no problem, even if an n-day as almost nobody patches.

*.gov.uk is less than 1% patched btw, many of the systems haven't been patched for years - the dates are firmware versions. The US federal government is only marginally better. I'm guessing orgs don't even know where they have ASA.

The plan is to start publishing the data publicly since I don't think anybody has an understanding of what the real world looks like.

#CyberWillyWave

I had to restart the #CyberWillyWave ASA scan as my server restarted (RIP), but it looks a bit better today - approx. 10% patched now, 5 days in.

My Cisco ASA firmware versions scan is now public: https://github.com/GossiTheDog/scanning/blob/main/Cisco-ASA-firmware-updates-CVE-2025-20333-CVE-2025-20363-CVE-2025-20362.csv

Fields:
IP,hostnames,FirmwareVersionKnown,FirmwareModifiedDate,Errors

Dates are UK date format - DD/MM/YY

If FirmwareModifiedDate is below */08/25 or */09/25, the device is vulnerable to #CyberWillyWave as the firmware was complied August 2025 or later.

New scan running now, results at weekend.

It gives you a very good indication as to how regularly orgs patch, e.g.

Gotta make sure we buy magic boxes to defend against AI GenV cyber mega attacks and quantum

My Cisco ASA firmware versions scan is now updated: https://github.com/GossiTheDog/scanning/blob/main/Cisco-ASA-firmware-updates-CVE-2025-20333-CVE-2025-20363-CVE-2025-20362.csv

Fields:
IP,hostnames,FirmwareVersionKnown,FirmwareModifiedDate,Errors

Dates are UK date format - DD/MM/YY

If FirmwareModifiedDate is below */08/25 or */09/25, the device is vulnerable to #CyberWillyWave as the fixed firmware was complied August 2025 or later.

New scan running now, results at midweek.

Patch rates are still below 20%.

Edit: #CyberWillyWave

scanning/Cisco-ASA-firmware-updates-CVE-2025-20333-CVE-2025-20363-CVE-2025-20362.csv at main · GossiTheDog/scanning

Contribute to GossiTheDog/scanning development by creating an account on GitHub.

GitHub

My Cisco ASA firmware versions scan is now updated: https://github.com/GossiTheDog/scanning/blob/main/Cisco-ASA-firmware-updates-CVE-2025-20333-CVE-2025-20363-CVE-2025-20362.csv

Fields:
IP,hostnames,FirmwareVersionKnown,FirmwareModifiedDate,Errors

Dates are UK date format - DD/MM/YY

If FirmwareModifiedDate is below */08/25 or */09/25, the device is vulnerable to #CyberWillyWave as the fixed firmware was complied August 2025 or later.

New scan running now, results at weekend.

Patch rates are at 22% complete, two weeks in.

Y'all probably want to patch.

If anybody is wondering, number of Cisco ASA devices with WebVPN enabled with their firmware year:

2025 - 10570
2024 - 12428
2023 - 3888
2022 - 4594
2021 - 3951
2020 - 2076

The average is orgs are around 18 months behind with patching (for internet facing).

If anybody is wondering how these scans are generated - one time @shodan search for AnyConnect boxes, export, then vibe coded scanner that fingerprints firmware creation date using the SSL applet and outputs to CSV.

About 40% of orgs are missing from results as they are clientless.

There’s much better ways of doing it.

Those Cisco ASA vulns continue to be patched at a slow rate.

UK orgs, sign up for the NCSC Early Warning system and actually patch your systems when notified.

https://www.ncsc.gov.uk/section/active-cyber-defence/early-warning

My Cisco ASA firmware versions scan is now updated: https://github.com/GossiTheDog/scanning/blob/main/Cisco-ASA-firmware-updates-CVE-2025-20333-CVE-2025-20363-CVE-2025-20362.csv

Fields:
IP,hostnames,FirmwareVersionKnown,FirmwareModifiedDate,Errors

Dates are UK date format - DD/MM/YY

If FirmwareModifiedDate is below */08/25, the device is vulnerable to #CyberWillyWave as the fixed firmware was complied August 2025 or later.

New scan running now, results on probably Wednesday.

Patch rates are at 25% complete, two weeks in.

Y'all probably want to patch.

Btw - one observation from the #CyberWillyWave ASA data - less devices respond each time I scan. They’re not blocking me - the devices are just offline.

I know a few regional CERTs have been using the data to inform orgs to patch, I think what’s happening is orgs are finding they have old devices and are nuking them. I’m free attack surface management!

An observation from CVE-2025-20333 (Cisco ASA AnyConnect vuln) - orgs just don't patch ASA.

The patch rate is really, really poor - ransomware groups are likely going to reinvest in targeting Cisco ASA product security, even just n-days, as realistically tens of thousands of organisations are years behind with patching their edge VPN appliances -- it's an open door into the world's largest companies.

Upwards of 70% of orgs never patched this one - thankfully it's just China with the exploit.

If anybody is wondering, yes, the Congressional Budget Office Cisco AnyConnect box in the scan results was over a year behind with patching, and yes it was (and is) shut down - I understand it was the entry point of their incident. I had told them.

CISA are warning US government organisations they still haven't patched for #CyberWillyWave. Which is true. New scan data coming at the weekend.

https://www.bleepingcomputer.com/news/security/cisa-warns-feds-to-fully-patch-actively-exploited-cisco-flaws/

CISA warns feds to fully patch actively exploited Cisco flaws

CISA warned federal agencies to fully patch two actively exploited vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Firepower devices.

BleepingComputer

If anybody knows anybody at SitusAMC, they probably want to patch AnyConnect as they're on firmware from over a year ago as of today.

root@serenity:~# cat scannyany9.txt | grep situ
150.221.36.140,*.situsamc.com|situsamc.com,YES,14/03/24,N/A

@GossiTheDog I hope my two ASA's are still good enough for simple packet filtering.
VPN is disabled (might be I need to triple-check) and I switched to OPNsense/OpenVPN.

Are you planning to graph the results by country?

@GossiTheDog You should probably add a column for "vulnerable" instead of relying on people to mentally parse a UK dd/mm/yy date.
@GossiTheDog can't patch if you've been sent home. Can't care if your employer has made it clear that you're not allowed to do so.
@GossiTheDog to be fair... the government shutdown was _not_ the issue for the 2023 one...
@GossiTheDog I’m just wondering are you sure of the test? I remember we got trapped in an ASA scanning script which was expecting an HTTP 200 while the patch gives a redirect but this was also a 200.
@GossiTheDog orgs don't patch ASAs for a multitude of reasons.
Patching is a pain in the butt, requires an active Cisco maintenance contract and it's often deployed as a "set and forget" kind of solution.
They also likely lack the visibility and detections for when they have been owned.
@GossiTheDog I'm trying to understand, where is this firmware timestamp coming from? It does not seem to be an HTTP header and I can't find it in the page source either.
@GossiTheDog do you share the IP you are scanning from..trying to build a correlation of what i have logged from know scanners vs possible attacks
@GossiTheDog please know the security team is desperately trying to get the infrastructure team to patch D:

@GossiTheDog

Why am I not surprised?

Ah yes, cause I'm in incident response for a while and this is our default meme:

@GossiTheDog thanks, there’s some interesting ones in there like dc.vpn.cisco.com.

Just to double check my understanding, the list is everything running potentially vulnerable services and you need to filter out the patched ones from the list?

@GossiTheDog Can you easily modify your scan to add geolocation information? (Country, City, Organization) I can easily do at my end; I have a Python script for that - but it might be valuable to other people, so it would be better if the original source already contains this information.
@GossiTheDog I think you have a typo, compiled August 2025 or *earlier* (not later)
@GossiTheDog Hmmm....all of my boxes are still missing from the list (they are patched on 9.23.1.19). You can DM me if you want any IP/hostnames as samples.
@GossiTheDog Can you share which file you query to get the firmware date?
@GossiTheDog cheers Kev, appreciated.

@GossiTheDog
Enterprises don't patch shit.

Srsly. My job is software for enterprise-scale storage systems, and all the data we get from the field says that our median customer is parked on a release from, like, 2018. They only upgrade if they do a hardware expansion and the new hardware is incompatible with the old release.

Because there's this attitude of "if you don't touch it, it won't break"

@GossiTheDog thank you, can you share what date you started your scan on for that data?
@GossiTheDog Odd, all 5 of my units are public facing and several of them are on port 443 with SSL VPN enabled...but they didn't make the list.
@GossiTheDog would you mind sharing the methodology that you used to fingerprint the firmware modification date now that you published your list? I’d love to see if my new employer is also still vulnerable 🤭