CISA Issues Urgent Warning Over Active Exploits in ScreenConnect, ASUS Routers, and Craft CMS

Listen to this Post

Featured Image
Federal Agencies Under Cyber Siege: The Growing Threat of Exploited Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has raised the alarm once again, issuing an urgent warning to federal agencies across the United States. A critical vulnerability in ConnectWise’s ScreenConnect software—recently patched—has come under active exploitation, allowing remote code execution that could lead to significant breaches. But that’s not all. CISA also highlights four additional vulnerabilities, two of them critical, in widely used ASUS routers and the Craft content management system (CMS), which are now targets of malicious actors.

This alert reflects a broader concern among cybersecurity professionals: attackers are increasingly zeroing in on newly patched or undisclosed vulnerabilities to carry out highly targeted campaigns. As sophisticated threat actors—possibly state-sponsored—become more aggressive, CISA is pushing agencies to act before June 23 by either patching or removing affected systems.

Cybersecurity Flashpoint: Vulnerabilities Across Key Platforms Trigger Government Alerts

On April 24, ConnectWise patched a serious security issue labeled CVE-2025-3935, affecting its ScreenConnect remote desktop tool. The bug allows attackers to carry out a ViewState code injection via ASP.NET Web Forms if they manage to compromise machine keys. This technique can enable remote code execution (RCE) on vulnerable servers. Although ConnectWise claims only a small number of its customers were affected, the breach is suspected to be part of a state-sponsored campaign.

Meanwhile, four additional vulnerabilities are drawing attention due to their active exploitation. These include two in ASUS routers—CVE-2021-32030 and CVE-2023-39780—and two in Craft CMS—CVE-2024-56145 and CVE-2025-35939. These bugs range from authentication bypass to code and OS injection, and they carry critical or high severity scores.

ASUS devices, particularly the RT-AX55, are reportedly being leveraged in stealth attacks linked to a botnet called AyySSHush. This botnet combines the CVE-2023-39780 flaw with an unlisted authentication bypass exploit to gain access and control over devices.

CISA has officially included these vulnerabilities in its Known Exploited Vulnerabilities (KEV) Catalog and is urging all federal entities to mitigate risks by June 23. The growing number of exploited flaws underscores the shift from reactive security to proactive defense, especially as older manual patching systems become outdated and unreliable.

A separate note in the alert encourages IT teams to consider automated patching solutions, suggesting that traditional methods are too slow and ineffective in the face of today’s rapidly evolving threat landscape.

What Undercode Say:

This warning from CISA is more than a routine alert—it signals a shift in the threat landscape where cybercriminals are exploiting both newly patched and older vulnerabilities with increasing speed and precision. The ScreenConnect flaw, CVE-2025-3935, is especially dangerous because it targets the very fabric of how ASP.NET Web Forms maintain data state. Once an attacker gains access to machine keys, they essentially hold a master key to the server, enabling them to inject and execute malicious code silently.

Equally concerning is the activity around ASUS routers and Craft CMS. The fact that the RT-AX55 router vulnerability has been exploited to form a botnet illustrates how consumer-grade devices are being pulled into broader threat campaigns. The creation of AyySSHush, chaining together known and unknown vulnerabilities, reflects the increasing sophistication of adversaries—likely groups with access to significant resources and technical know-how.

Craft CMS’s exposure is another red flag. Content management systems are a favorite target due to their widespread use and often lax security configurations. CVE-2024-56145 and CVE-2025-35939 show how CMS platforms can be turned into launchpads for RCE attacks, especially if patching is delayed or improperly executed.

CISA’s June 23 deadline puts agencies on a tight clock, and the urgency should not be underestimated. These vulnerabilities are not theoretical—they’re actively being exploited in the wild. A failure to patch or mitigate could mean compromise, data theft, or worse.

The recurring theme here is the inadequacy of manual patch management. Cyberattacks move faster than humans can respond. Automation, especially AI-driven patch deployment and vulnerability scanning, is no longer optional—it’s a necessity. Government agencies and private businesses alike must evolve their cybersecurity practices to meet this accelerating threat.

The broader implication? This is a wake-up call for every organization relying on legacy tools and processes. It’s not just about plugging holes—it’s about building resilient, self-healing systems capable of anticipating and neutralizing threats before they take root.

Fact Checker Results:

✅ Confirmed active exploitation of CVE-2025-3935

✅ ASUS RT-AX55 devices linked to botnet activity

✅ Craft CMS vulnerabilities listed in CISA’s KEV Catalog 🛡️

Prediction:

As attackers continue to weaponize both public and undisclosed vulnerabilities, we can expect a rise in hybrid botnets using chained exploits across consumer and enterprise devices. By late 2025, automated, AI-powered patching solutions will become a default standard in federal and corporate IT policies. Organizations that delay this shift risk becoming the next breach headline.

References:

Reported By: www.bleepingcomputer.com
Extra Source Hub:
https://www.medium.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram