F5, Cisco, SonicWall, Microsoft, Lastpass, Bitwarden and 1Password Security Alerts

by | Oct 27, 2025 | Security Alerts | 0 comments

This month brought several high-severity security events affecting key vendors we rely on for protection. F5, Cisco, and SonicWall disclosed serious vulnerabilities and compromises. Password managers including LastPass, Bitwarden, and 1Password were also targeted, and Microsoft reported a critical ASP web server flaw.

Prompt action and user education remain essential to safeguarding your organization.

F5, Cisco and Sonicwall:

  • F5, a leading firewall vendor, discovered that attackers had accessed its environment for over a year. The company issued an advisory with more than 24 high-severity patches. All F5 appliances should be updated immediately, with enhanced monitoring in place.
  • SonicWall reported that attackers accessed all customer firewall backups, including encryption keys and configurations. Anyone with SonicWall firewalls should immediately change all passwords and rotate VPN keys.
  • Cisco disclosed that attackers exploited zero-day flaws to breach ASA and Firepower firewalls and switches. Users should update firmware, change passwords, and rotate VPN encryption keys immediately.

LastPass, Bitwarden and 1Password:

This month we learned about attackers exploiting user fears with convincing phishing emails posing as password manager alerts. These fake updates install legitimate remote management tools that evade detection and allow full system control.

Microsoft ASP:

Microsoft disclosed a high severity vulnerability with the highest severity rating of 10 for it’s web hosting technology ASP. The vulnerability would let attackers to access credentials and file data.

Prosper Data Breach:

Hackers stole personal data including SSNs and government IDs from 17.6 million Prosper users. Affected users should check for exposure and place credit freezes with all three major bureaus.

What do I need to do?

  • Confirm that any F5, Cisco or Sonicwall firewalls have had their administrative passwords changed, encryption keys rotated, and had the latest security updates applied. Additional ongoing monitoring should also be considered
  • Staff should be reminded of the risks associated with email phishing scams and should be made aware of the latest attempts targeting password managers. Regular end user security awareness training is recommended.
  • Confirm that any Windows web server in use have been patched. It is also recommended to have a Web Application Firewall (WAF) in front of any public facing web servers.

 

Additional Resource and Details:

As always if you have any questions or concerns about this latest security disclosure, please feel free to reach out.

 

Related posts

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *