Network Security, Endpoint/Device Security, Threat Intelligence![A sign with the Cisco logo is seen outside of a building](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/10/1006_cisco.jpg)
Cisco firewalls targeted in sophisticated nation-state espionage hack
![A sign with the Cisco logo is seen outside of a building](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/10/1006_cisco.jpg)
(Adobe Stock Images)
A previously unidentified hacking group — believed to be a nation-state threat actor — has attacked Cisco firewall appliances in what cybersecurity agencies believe is an espionage campaign targeting government networks and critical infrastructure.Cisco has dubbed the campaign "ArcaneDoor" and warned that it is targeting devices running its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software.The vendor has issued patches, which it is urging customers to apply, for three zero-day vulnerabilities being leveraged in the attacks.A joint advisory from the UK’s National Cyber Security Centre, the Canadian Centre for Cyber Security (Cyber Centre), and the Australian Signals Directorate's Australian Cyber Security Centre, also encouraged urgent patching. In their advisory, the three agencies said they had been monitoring the campaign since early this year and believed its sophisticated nature — involving “multiple layers of novel techniques and the concurrent operations against multiple targets around the world” — was cause for concern.“The capabilities are indicative of espionage conducted by a well-resourced and sophisticated state-sponsored actor,” they said.“Since VPN services are essential components of computer network security, vulnerabilities in such services are particularly consequential.”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two of the bugs to its Known Exploited Vulnerabilities Catalog and ordered federal civilian executive branch agencies to apply the patches to all affected software by May 1.The bugs are CVE-2024-20353, an infinite loop vulnerability that can lead to remote denial of service, and CVE-2024-20359, a privilege escalation vulnerability that can allow local privilege escalation from Administrator to root.The threat actor responsible for the attacks is being tracked as UAT4356 by Cisco, and as STORM-1849 by Microsoft, but neither Cisco, nor any of the agencies voicing concern about the threat, have commented on which nation-state it is believed to be linked to.
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds