The NCSC advises organisations who use Cisco Firewall to take immediate action to mitigate vulnerabilities affecting Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software (CVE-2024-20353, CVE-2024-20358, CVE-2024-20359) and follow the latest vendor advice.
The NCSC has also issued a joint advisory and two malware analysis reports to help network defenders detect and mitigate malicious activity associated with these vulnerabilities.
Information for this blog was sourced using ncsc.gov.uk. You can read the full story here
What has happened to Cisco Firewall?
Cisco has published advisories detailing three vulnerabilities affecting its ASA and FTD devices.
Cisco is aware of active exploitation of CVE-2024-20353 and CVE-2024-20359.
CVE-2024-20353: A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) software could allow an unauthenticated remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.
CVE-2024-20358: A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality available in Cisco ASA Software and Firepower Threat Defense (FTD) software could allow an authenticated local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.
CVE-2024-20359: A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins which has been available in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) software could allow an authenticated local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.
The NCSC will continue to monitor for any impact of these vulnerabilities on UK organisations.
Who is affected?
Organisations using Cisco ASA or Cisco FTD. No specific configuration is required.
Cisco FTD is only affected by CVE-2024-20358 when lockdown mode is enabled to restrict Linux shell access. Note that lockdown mode is disabled by default.
Exploitation of Cisco Firewall
Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.
The NCSC has also issued a joint advisory and two malware analysis reports to help network defenders detect and mitigate malicious activity associated with these vulnerabilities.
What should I do?
The NCSC recommends following vendor best practice advice to mitigate these vulnerabilities. In this case, if you use Cisco ASA or Cisco FTD, you should take these priority actions:
Monitor the vendor advisory and install the security update once it is available for your version.
Carry out continuous monitoring and threat hunting activities.
If you believe you have been compromised, you should contact Cisco PSIRT and if you are in the UK, also report it to the NCSC.
For all businesses, agility and innovation are essential for staying competitive. But what happens when employees act faster than your IT policy can keep
Artificial Intelligence (AI) is transforming industries by improving efficiency and decision-making. However, cybercriminals are also harnessing AI to create more sophisticated and targeted cyber
For many growing businesses, having access to board-level IT leadership can make the difference between simply maintaining systems and using technology as a driver
In sectors where client trust is everything legal, accountancy, financial services the cost of a cyber breach goes far beyond lost data. It strikes
In today’s rapidly evolving business landscape, relying solely on reactive IT support can hinder your organisation’s growth and resilience. Without a strategic IT roadmap,
How 4th Platform (Powered by Gamma) keeps your business ahead with Cloud Communications. The UK’s analogue phone network is being switched off in 2027, and
Why getting your cloud setup right the first time matters more than you think. Cloud services have revolutionised how modern businesses operate offering flexibility,
Despite increased awareness of cyber threats across the legal sector, law firms continue to be prime targets for cybercriminals. These attacks are no longer
In today’s fast-paced business environment, technology is the backbone of productivity. When IT systems run smoothly, employees can focus on their tasks without unnecessary
When we think about cybersecurity threats, external hackers and cybercriminals often come to mind. However, some of the most significant risks come from within