Cisco ASA, ArcaneDoor & CVE-2025-20362: WireGuard and NetBird as a Modern VPN Stack

Editorial note: The information in this article was compiled to the best of our knowledge at the time of publication. Technical details, prices, versions, licensing terms, and external content may change. Please verify the information provided independently, particularly before making business-critical or security-related decisions. This article does not replace individual professional, legal, or tax advice.

NetBird as a VPN flat rate — managed in Germany — WZ-IT runs NetBird including management, signal and relay servers on our own infrastructure. Per-user flat rate instead of Cisco licensing, SSO integration, NIS2-compliant. Book a kickoff call · More about the VPN flat rate · NetBird Managed
A Cisco ASA vulnerability from September 2025 is still being actively exploited in May 2026. Seven months after the patch, CrowdSec counts 292 source IPs and 2,330 attack signals over 89 days. The bug is part of ArcaneDoor — a suspected China-linked espionage campaign that has been subverting Cisco devices with firmware-deep bootkits since May 2025 and, since 23 April 2026, also with the FIRESTARTER backdoor at the FXOS layer, which keeps even patched systems compromised. CISA has issued an emergency directive, the UK NCSC has published a malware analysis report, and the German Mittelstand is sitting on the same boxes.
This is not the first incident of its kind, and it won't be the last. The 2025 Verizon Data Breach Investigations Report puts edge-device exploitation at 22 percent of all vulnerability breaches — an eight-fold jump in a single year. Cyber insurers attribute 80 percent of ransomware to remote-access services. On-premise VPNs are statistically associated with an almost seven-fold higher attack risk than no VPN at all. That is not an accident; it is structural.
This piece sorts out what happened at Cisco, why it fits into a larger movement, and how a modern VPN stack of WireGuard and NetBird stands structurally stronger — all the way through to a concrete migration path for companies that want to retire their edge appliance.
Table of contents
- CVE-2025-20362 — the immediate trigger
- ArcaneDoor — what the attackers actually do
- Edge devices under siege — the numbers
- Why legacy VPN appliances structurally lose
- WireGuard — 4,000 instead of 400,000 lines of code
- NetBird — WireGuard turned into an enterprise solution
- Cisco ASA vs. modern mesh VPNs
- Migration — how companies move
- How we approach this at WZ-IT
- Further reading
CVE-2025-20362 — the immediate trigger
On 25 September 2025 Cisco publishes advisory cisco-sa-asaftd-webvpn-YROOTUW. CVE-2025-20362 is an authentication bypass in the VPN web server of Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD): insufficient validation of user input in HTTP(S) requests lets attackers reach restricted URL endpoints without a valid session. CVSS score: 6.5. Sounds moderate.
The real power emerges in the chain. Cisco simultaneously publishes CVE-2025-20333 — a buffer overflow in the same WebVPN stack that allows authenticated remote code execution as root (CVSS 9.9). Combined, that is the chain showing up in telemetry reports: bypass via 20362, RCE via 20333, root shell on the appliance. A third issue (CVE-2025-20363, CVSS 9.0) extends the RCE vector.
CISA responds the same day with Emergency Directive 25-03, requiring US federal agencies to identify and mitigate immediately. Both vulnerabilities land in the KEV catalogue (Known Exploited Vulnerabilities) on day one. The UK NCSC, the Canadian Centre for Cyber Security and NHS England Digital follow with their own alerts. On 5 November 2025, Cisco adds an update: unpatched ASA devices can be remote-crashed even without RCE — doubling the pressure to patch.
Seven months after the patch, CrowdSec still documents 292 attacking IPs and 2,330 signals over 89 days, with peak days of 142 attack attempts. The bug is patched — the devices are far from all patched. That is the classic edge-device reality: patches exist, but service downtime delays installation, and every unpatched day is an open door.
ArcaneDoor — what the attackers actually do
Behind most of these attacks is not a script kiddie crew but UAT4356, tracked by Microsoft as Storm-1849 — a suspected China-linked espionage operation (the original 2024 Cisco Talos analysis deliberately holds back on hard attribution; the industry consistently uses "China-nexus" or "suspected China-linked") that already surfaced in 2024 under the ArcaneDoor moniker (MITRE C0046) with components LINE DANCER and LINE RUNNER. The 2025/2026 wave brings significantly deeper persistence.
RayInitiator is a multi-stage bootkit that is flashed into the ROMMON (Read-Only Memory Monitor) of the ASA. Translation: the attacker modifies the GRUB bootloader at firmware level. Reboots survive that, firmware updates survive that. On Cisco ASA 5500-X without Secure Boot it is a permanent back door below the operating system.
LINE VIPER is the second stage — a user-mode shellcode loader that patches the lina process (the heart of the ASA, "Linux-based Integrated Network Architecture"). LINE VIPER can execute arbitrary CLI commands, enable packet capture, bypass AAA authentication for the attacker's own devices, suppress syslog output, capture every CLI input, and force controlled reboots. C2 runs along two parallel paths: inbound commands hidden in ICMP packets with replies partly over raw TCP back to the attacker, or alternatively over tampered WebVPN authentication sessions — both vectors invisible to classical firewall rule sets.
FIRESTARTER (23 April 2026): Cisco Talos and Cisco PSIRT later disclosed a third persistence component — a backdoor at the FXOS layer, that is, below the ASA software layer. The consequence sharpens the situation considerably: devices that ArcaneDoor actors had access to before the September 2025 patch remain compromised even after the patch has been installed if FIRESTARTER had been implanted beforehand. The original argument "patching isn't enough, the ROMMON has to be replaced or the device swapped" now extends to "or the FXOS has to be re-installed from scratch". Sources: Canadian Cyber Centre AL25-012 Update and the joint FIRESTARTER Malware Analysis Report by CISA and NCSC of 23 April 2026.
The silent kill switch: Cisco documents in its advisory that attackers have deliberately crashed compromised devices to sabotage forensic core dumps. Logging disabled, CLI inputs captured, then crash. Whoever wants to analyse the incident is left with nothing.
A typical initial infection looks like this: ArcaneDoor actors obtain VPN credentials from former employees or via earlier compromises, log into the WebVPN portal, escalate via the RCE chain to root, flash RayInitiator, install LINE VIPER, uninstall their tools — and the back door stays in ROMMON. Agencies in the US, UK and Canada have found devices where persistence had remained undetected for months.
Edge devices under siege — the numbers
Cisco is not a special case. The numbers for 2025/2026 show a clear shift:
- Verizon DBIR 2025: edge-device exploitation rises from 3 to 22 percent of all vulnerability breaches — an 8x jump in a single year
- Recorded Future H1 2025: 53 percent of actively observed exploitation is state-motivated; edge appliances account for 17 percent of all actively exploited CVEs
- Coalition / At-Bay (cyber insurers): 80 to 87 percent of ransomware incidents trace back to remote-access services
- Insurance stat: on-premise VPN use is associated with a 6.8x higher cyber-attack risk than no VPN at all
- Mandiant M-Trends 2026: median time from initial access to handoff to follow-on operator: 22 seconds (2022: over eight hours)
- CrowdStrike 2026 Global Threat Report: eCrime breakout time median 29 minutes, fastest measured case 27 seconds
- GreyNoise State of the Edge: 2.97 billion malicious sessions July–December 2025 — about 212 per second
The hall of shame of the past 24 months is striking: Cisco ASA/FTD (ArcaneDoor), Ivanti Connect Secure (UNC5221, 16 KEV listings since 2024), Citrix NetScaler (CitrixBleed 1 and 2, 11.5 million exploitation attempts), Fortinet FortiGate (CVE-2025-59718 plus a patch that did not patch), F5 BIG-IP (source code theft in October 2025), SonicWall SMA1000, Palo Alto GlobalProtect. No classical VPN-appliance vendor has been spared.
The structural weakness, summarised by Trend Micro in its Edge Under Siege analysis: edge devices sit at trust boundaries, hold privileged access for lateral movement, accept no EDR agent (blind spot for the SOC), are hard to investigate forensically, and patches cause service downtime — which is why they get delayed systematically. Verizon DBIR measures a median patch time of more than 30 days.
CISA reacted in February 2026 with an 18-month directive: federal agencies must completely retire unsupported edge devices. That is the official statement that the legacy "VPN appliance" class is at the end of the line for high-security environments.
Why legacy VPN appliances structurally lose
Four reasons why this pattern is not a temporary trend:
Large code bases with web portals. Cisco ASA and comparable appliances ship a full web-VPN stack — login portals, SAML/OAuth integration, browser-based tunnel configuration, AAA backend. Hundreds of thousands of lines of code, each one a potential attack vector. The ASA WebVPN bypass is exactly that class of flaw: somewhere in the request pipeline, input is insufficiently validated.
Patches arrive too late — and don't always work. Median patch time over 30 days, simultaneously with active exploitation on disclosure day. Fortinet shipped patches in 2025/2026 that did not solve the problem on multiple occasions. That is not vendor bashing — it is the inevitable result of every patch in a closed, monolithic firmware introducing its own risk.
No EDR, no observability. A Cisco ASA runs no CrowdStrike agent, no SentinelOne, no Microsoft Defender. Whatever happens on the box, the SOC does not see. In the ArcaneDoor case, that was precisely the condition under which persistence remained undetected for months.
Vendor lock-in prevents agile reaction. A Cisco licence does not switch in two weeks. The hardware does not switch in two quarters. The vendor's pace becomes the ceiling of your own security posture.
The result: a class of devices that is too large to patch, too opaque to monitor and too rigid to swap. Exactly that is why state-aligned actors are concentrating their energy here in 2025/2026.
WireGuard — 4,000 instead of 400,000 lines of code
WireGuard is the answer to nearly every one of those points:
- Kernel-integrated into the Linux kernel since 5.6 with around 4,000 lines of code — versus tens to hundreds of thousands of lines in OpenVPN, IPsec stacks and Cisco-proprietary implementations. Less code, less attack surface, simpler audits.
- Formally verified. Parts of the crypto stack are mathematically proven correct — something no classical VPN stack can claim.
- Cryptokey routing instead of username/password. Every connection runs over public-key authentication with perfect forward secrecy and automatic key rotation. There is no login portal that could be bypassed.
- No web server, no HTTP endpoint. A WebVPN bypass in the style of CVE-2025-20362 is structurally impossible — there simply is no endpoint where authentication could be circumvented. Without a private key, no network access.
- Stateless handshake. Unlike IPsec/IKE there is no multi-step state machine, no lengthy connection setup, sub-millisecond reconnects after network changes. That is not just convenience — it is a drastic reduction of the complexity that can be compromised.
- Patches are rare and trivial. WireGuard bugs in the kernel implementation are exceedingly rare; when they do occur, they flow in via the distribution along with the regular kernel patch cycle — no maintenance window for "restart the VPN appliance".
The short code base is not just marketing. It is the structural bet that less code has fewer bugs — and in WireGuard practice that bet has paid off.
NetBird — WireGuard turned into an enterprise solution
WireGuard answers "how do I encrypt the tunnel?". It does not answer "who is allowed to access what?", "how do I connect 200 employees across three sites?", or "how do I integrate this with our SSO?". That is exactly where NetBird comes in.
NetBird is an open-source platform headquartered in Berlin that uses WireGuard as transport and adds a zero-trust layer around it:
- Identity-aware access. SSO/MFA integration with Microsoft Entra, Google Workspace, GitHub, Okta, Authentik or Zitadel. When an employee leaves, disabling them in the identity provider revokes VPN access instantly — the ArcaneDoor-typical pattern of stale credentials still working is closed off.
- P2P mesh instead of central gateway. Devices connect to each other directly, coordinated by a signal server that handles only key exchange and NAT-traversal assistance. No central tunnel concentrator as an attractive target.
- Granular policies. Instead of "in the VPN = in the whole network", NetBird defines which identity can reach which asset — least privilege at the network layer.
- No open inbound ports. Devices connect outbound to the management server, with NAT traversal via STUN/TURN. Nothing for an attacker to reach directly from the internet.
- Compliance hooks. Audit logs, device posture checks, SIEM export — SOC2-friendly.
- Post-quantum path. Integration with the Rosenpass project for quantum-safe key exchange.
Particularly relevant for German companies: NetBird is funded by Germany's Federal Ministry of Education and Research under the StartUpSecure programme together with the CISPA Helmholtz Center for Information Security. That is not a marketing story but a hard sovereignty fact: critical VPN infrastructure rooted in German research, open source, hostable in Germany. The management plane is AGPLv3, the clients are BSD-3-Clause.
Cisco ASA vs. modern mesh VPNs
| Aspect | Cisco ASA / classical appliance | WireGuard + NetBird |
|---|---|---|
| Code base (tunnel layer) | Proprietary, closed, well into six figures | WireGuard ~4,000 LoC, open source |
| Audit | Closed source | Public, parts formally verified |
| Auth model | Username/password + WebVPN portal | Cryptokey routing + identity provider |
| Web portal as attack surface | Yes | No |
| Perfect Forward Secrecy | Optional, configuration-dependent | Default, automatic rotation |
| Single point of failure | Central concentrator | P2P mesh, no central data plane |
| Identity-aware | Add-on via AAA | Native via SSO |
| EDR possible | No (appliance) | Yes (on endpoints) |
| Persistence in ROMMON / bootloader | Documented in the wild | Not applicable — no dedicated hardware layer |
| Patch cycle | Vendor, often >30 days | Distribution / container, immediate |
| Patches that fail to patch | Documented multiple times | Very rare, kernel code |
| Licensing model | Per box + per user + per feature | Open source / per-user subscription |
| EU sovereignty | US vendor | Berlin platform, optionally self-hosted |
| NIS2 / GDPR auditability | Limited by vendor logging | Full control over logs and telemetry |
The table is not exhaustive but illustrates the core point: a modern stack is not only safer in detail but structurally different in shape.
Migration — how companies move
A Cisco-to-NetBird migration is not the weekend flip that tutorials suggest. In practice it runs in three phases:
Phase 1 — Inventory. Which tunnels are currently in place, which users, which site-to-site connections, which AAA policies? Which devices (Mac, Windows, Linux, mobile) need to be served? Which identity system is set as the auth source? Which compliance requirements (NIS2, BSI C5, ISO 27001) must be met? Output: an architecture document with a target/current comparison.
Phase 2 — Pilot. NetBird management in a dedicated environment (managed in our infrastructure or self-hosted with you), pilot group typically IT and DevOps. Parallel operation alongside the existing Cisco setup, so that rollback is possible at any time. Tests for performance, NAT traversal behind your real corporate firewalls, SSO integration, policy build-out. Duration: two to four weeks.
Phase 3 — Gradual roll-out. Per site, per department or per use case (first remote workers, then site-to-site, then load data) Cisco is shut down and NetBird takes over. Every step has a clear rollback path to the Cisco configuration. After a successful cutover, the ASA hardware is decommissioned and ideally destroyed — particularly in suspected ArcaneDoor cases a simple re-flash is not enough, because the bootkit sits in ROMMON.
In practice, a Mittelstand migration with 80 to 300 users and two to five sites takes between four and twelve weeks. That is much faster than any classical Cisco hardware migration — because NetBird clients are pure software and roll out in minutes per device.
How we approach this at WZ-IT
We offer the modern stack as a managed service via our VPN flat rate — flat per user, with no licence-step changes between features:
Managed NetBird on our own infrastructure in Germany. Management server, dashboard, signal server and relay/TURN components on our GDPR-compliant infrastructure. SSO integration with your identity system (Entra, Google Workspace, Authentik or Keycloak). Granular policies, audit logs, device posture checks. 24/7 monitoring and CVE monitoring included — which would be a separate licence at Cisco is part of the offering here.
Alternatives for other setups. If you prefer pure WireGuard without a management plane (typical for site-to-site or server-to-server), we deliver that via our WireGuard expertise. If you want to replace existing Tailscale structures for compatibility reasons, Headscale is an open-source coordination server. For reverse tunnels and edge exposure there is Pangolin.
Migration from classical VPNs. Cisco ASA, Fortinet FortiGate, Palo Alto GlobalProtect, OpenVPN stacks, legacy IPsec — for each of these starting points we have a migration runbook and the first weeks of hand-holding included. For NIS2-relevant setups we document the migration as an annex to your risk management documentation.
Concretely in the ArcaneDoor case. Whoever runs Cisco ASA with suspected compromise should not just patch the device but take it out of the network and replace it with a NetBird solution — RayInitiator in ROMMON and FIRESTARTER in FXOS both survive otherwise, regardless of the September patch. We handle the cutover logistics so that no operational interruption arises.
Further reading
- VPN flat rate with managed NetBird — the direct answer to Cisco licence stacks and proprietary VPN boxes
- NetBird managed service — architecture and scope in detail
- WireGuard hosting & setup — for setups without a management plane
- Headscale — open-source coordination server (Tailscale alternative)
- Pangolin — reverse tunnels and edge exposure
- NetBird vs. Tailscale — direct mesh-VPN comparison
- NetBird vs. ZeroTier — architecture differences in detail
- NetBird vs. Twingate — open source vs. proprietary zero-trust provider
- VPN cost per user — direct cost-comparison calculator
- Linux kernel vulnerabilities 2026 — patch management at board level — the NIS2 context and management liability
- Bleeding Llama (CVE-2026-7482) — the same pattern in self-hosted AI
Are you running Cisco ASA, Fortinet, Palo Alto or another legacy VPN stack — and after ArcaneDoor uncertain whether patches and trust are enough to continue? We review your current architecture at no cost and deliver a concrete migration recommendation with effort estimate, licence comparison and compliance evaluation — per user, with or without a transitional parallel operation.
Book a free VPN architecture review · To the VPN flat rate · More about NetBird
Frequently Asked Questions
Answers to important questions about this topic
CVE-2025-20362 is an authentication bypass in the VPN web server of Cisco ASA and Firepower Threat Defense, disclosed on 25 September 2025. CVSS 6.5 looks moderate but isn't — the bypass chains with CVE-2025-20333 (CVSS 9.9, RCE as root) into an unauthenticated remote root. CrowdSec is still tracking active exploitation seven months after the patch, with 292 source IPs. Affected: any Cisco ASA or FTD device with AnyConnect/WebVPN enabled and the September patch missing.
ArcaneDoor is a suspected China-linked espionage campaign (threat actor UAT4356 / Storm-1849; the original 2024 Cisco Talos analysis deliberately holds back on attribution) that has been targeting Cisco edge devices since May 2025 — five months before Cisco's disclosure. The tooling ranges from RayInitiator (multi-stage GRUB bootkit flashed into ROMMON, surviving reboots and firmware updates) to LINE VIPER (user-mode shellcode loader patching the lina process, accepting commands over hidden ICMP channels with replies partly over raw TCP) to the FIRESTARTER backdoor disclosed on 23 April 2026 at the FXOS layer, which keeps even patched systems compromised. Agencies in the US, UK, Canada and Germany have warned.
The 2025 Verizon DBIR puts edge-device exploitation at 22 percent of all vulnerability breaches, up from 3 percent the year before — an 8x jump. Coalition and At-Bay (cyber insurers) attribute 80 to 87 percent of ransomware incidents to remote-access services. Cyber insurers measure that on-premise VPN use is statistically associated with a 6.8x higher attack risk than no VPN at all. GreyNoise counted around 2.97 billion malicious sessions against edge infrastructure between July and December 2025 — about 212 per second.
WireGuard is around 4,000 lines of code in the Linux kernel — Cisco ASA codebases and OpenVPN stacks are ten to a hundred times larger. The protocol has no web server, no login portal and no HTTP endpoints; authentication is purely public-key (cryptokey routing) with automatic key rotation and perfect forward secrecy. A vulnerability class like the ASA web-VPN bypass is structurally impossible — there simply is no endpoint where authentication could be bypassed.
NetBird is a Berlin-based platform extending WireGuard into a zero-trust solution: identity-aware access with SSO/MFA (Entra, Google, GitHub, Okta), P2P mesh instead of a central gateway as a single point of failure, granular access policies instead of flat network access, device posture checks, audit logs for compliance. The project is funded by the German Federal Ministry of Education and Research via the StartUpSecure programme and the CISPA Helmholtz Center for Information Security — a rare clean sovereignty story. Self-hostable under AGPLv3, clients under BSD-3.
In three phases: 1. Inventory (which site-to-site tunnels, which remote workers, which policies?). 2. Pilot with a small user group, typically IT/DevOps — in parallel to the existing Cisco setup. 3. Gradual roll-out per site or department with clear rollback paths. We typically build the NetBird infrastructure (management server, signal server, optional own TURN relay) in two to three weeks; the migration runs four to twelve weeks depending on size. The Cisco appliance continues to operate during migration and is only decommissioned after a successful cutover.
We run NetBird as a managed service via our VPN flat rate — management server, dashboard, signal and relay components on our own infrastructure in Germany, with SSO integration, granular policy management, 24/7 monitoring and CVE monitoring included. For self-hosted setups we deliver architecture, hardening and training. Migrations from Cisco ASA, Fortinet FortiGate, Palo Alto GlobalProtect, OpenVPN and legacy IPsec setups are part of our standard repertoire.

Written by
Timo Wevelsiep
Co-Founder & CEO
Co-Founder of WZ-IT. Specialized in cloud infrastructure, open-source platforms and managed services for SMEs and enterprise clients worldwide.
LinkedInLet's Talk About Your Idea
Whether a specific IT challenge or just an idea – we look forward to the exchange. In a brief conversation, we'll evaluate together if and how your project fits with WZ-IT.


Timo Wevelsiep & Robin Zins
Managing Directors of WZ-IT




