April 24, Attacks Against Cisco Firewall Platforms

25th April 2024

Cisco have recently released details of three vulnerabilities, two of which have been identified in active use within an ongoing exploitation campaign dubbed ArcaneDoor.

The three vulnerabilities vary in severity; however, it is important to note that the initial compromise vector associated with ArcaneDoor remains unknown.

Cisco Security Advisory CVE ID Security Impact Rating CVSS Base Score
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability CVE-2024-20353 High 8.6
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability CVE-2024-20359 High 6.0
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability CVE-2024-20358 Medium 6.0

Data from: https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_attacks_event_response

Cisco’s threat research group, Talos, have produced a technical write-up, which can be found here: https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

The NCSC have issued a statement and additional details that can be found here: https://www.ncsc.gov.uk/news/exploitation-vulnerabilities-affecting-cisco-firewall-platforms

 

Our dedicated security teams are continuing to monitor the situation and Daisy is undertaking all necessary actions to ensure our customers are safe, following guidance from official authorities, including Cisco and the NCSC.

If you suspect you have been affected by this vulnerability or need to discuss further advice please contact our Service Desk team on 0330 024 3333 or raise a ticket via our Customer Portal.

Talk to one of our specialists.
Call us on
0344 863 3000