← Back to BrewedIntel
vulnerabilityhighReconnaissanceScanning

Sep 04, 2025 • GreyNoise Blog

25,000 IPs Scanned Cisco ASA Devices — New Vulnerability Potentially Incoming

GreyNoise has identified a significant surge in scanning activity targeting Cisco Adaptive Security Appliance (ASA) devices, indicating potential preparation...

Source
GreyNoise Blog
Category
vulnerability
Severity
high

Executive Summary

GreyNoise has identified a significant surge in scanning activity targeting Cisco Adaptive Security Appliance (ASA) devices, indicating potential preparation for exploiting a new vulnerability. In late August, over 25,000 unique IP addresses were observed scanning these devices in a single burst, drastically exceeding the typical baseline of fewer than 500 IPs daily. This escalation suggests coordinated reconnaissance efforts by threat actors seeking to identify vulnerable systems before public disclosure or patching. While no specific malware or attributed group is confirmed, the scale implies a high risk of subsequent exploitation attempts targeting network perimeters. Organizations utilizing Cisco ASA firewalls should immediately review logs for unusual inbound traffic, ensure firmware is updated to the latest secure versions, and implement strict access control lists to mitigate potential unauthorized access. Vigilance is required as this activity often precedes widespread exploitation campaigns targeting critical network infrastructure vulnerabilities.

Summary

GreyNoise observed two scanning surges against Cisco Adaptive Security Appliance (ASA) devices in late August including more than 25,000 unique IPs in a single burst. This activity represents a significant elevation above baseline, typically registering at less than 500 IPs per day.

Published Analysis

GreyNoise has identified a significant surge in scanning activity targeting Cisco Adaptive Security Appliance (ASA) devices, indicating potential preparation for exploiting a new vulnerability. In late August, over 25,000 unique IP addresses were observed scanning these devices in a single burst, drastically exceeding the typical baseline of fewer than 500 IPs daily. This escalation suggests coordinated reconnaissance efforts by threat actors seeking to identify vulnerable systems before public disclosure or patching. While no specific malware or attributed group is confirmed, the scale implies a high risk of subsequent exploitation attempts targeting network perimeters. Organizations utilizing Cisco ASA firewalls should immediately review logs for unusual inbound traffic, ensure firmware is updated to the latest secure versions, and implement strict access control lists to mitigate potential unauthorized access. Vigilance is required as this activity often precedes widespread exploitation campaigns targeting critical network infrastructure vulnerabilities. GreyNoise observed two scanning surges against Cisco Adaptive Security Appliance (ASA) devices in late August including more than 25,000 unique IPs in a single burst. This activity represents a significant elevation above baseline, typically registering at less than 500 IPs per day. GreyNoise observed two scanning surges against Cisco Adaptive Security Appliance (ASA) devices in late August including more than 25,000 unique IPs in a single burst. This activity represents a significant elevation above baseline, typically registering at less than 500 IPs per day.