Skip to main content

ED 25-03 Guidance for Device Updates and Patching November 12, 2025

  • November 12, 2025
  • 0 replies
  • 6 views

TripleHelix
Moderator
Forum|alt.badge.img+63

November 12, 2025

 

Emergency Directive 25-03: Identify and Mitigate Potential Compromise of Cisco Devices states that CISA has assessed that the following CVEs pose an unacceptable risk to federal information systems: 

  •  – allows for remote code execution 
  •  – allows for privilege escalation 

CISA mandates that these vulnerabilities be addressed immediately through the actions outlined in this Directive. 

In CISA’s analysis of agency-reported data, CISA has identified devices marked as “patched” in the reporting template, but which were updated to a version of the software that is still vulnerable to the threat activity outlined in the ED. CISA is tracking active exploitation of these vulnerable versions in FCEB agencies. For agencies with ASA or Firepower devices not yet updated to the necessary software versions or devices that were updated after September 26, 2025, CISA recommends additional actions to mitigate against ongoing and new threat activity. CISA urges all agencies with ASAs and Firepower devices to follow this guidance. As a reminder, the ED requires that agencies update ALL ASA and Firepower devices, not just public-facing devices, to the latest patch immediately to avoid exploitation. 

For further clarification, agencies need to be running minimum required software versions that mitigates both CVEs identified in ED 25-03. Please see the tables below for relevant software trains: 

 

More info and full list here