Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2024-60
Version:
1.0
Affected software:
Cisco Adaptive Security Appliance and Firepower Threat Defense Software
Type:
Web Services Denial of Service (DoS), Command Injection, and Persistent Local Code Execution Vulnerability
CVE/CVSS:
Cisco Systems Inc.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmd-inj-ZJV8Wysm
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h
NIST
https://nvd.nist.gov/vuln/detail/CVE-2024-20353
https://nvd.nist.gov/vuln/detail/CVE-2024-20358
https://nvd.nist.gov/vuln/detail/CVE-2024-20359
On April 24, 2024, Cisco Systems Inc. published information about three vulnerabilities in their Cisco Adaptive Security Appliance and Firepower Threat Defense Software (CVE-2024-20353, CVE-2024-20358, and CVE-2024-20359). At the same time, the company released patches for the affected software.
Two of the vulnerabilities, CVE-2024-20353 and CVE-2024-20359, are confirmed by Cisco Systems Inc. to have been exploited in the wild. A separate blog post by Cisco Talos further details the exploits that would be linked to a campaign - dubbed "ArcaneDoor" - by a new and presumably state-sponsored actor ("UAT4356" aka "STORM-1849") with a clear focus on espionage.
CVE-2024-20353, the vulnerability with the highest CVSS score of 8.6, allows an unauthenticated remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition and a high impact on availability. Cisco Talos reported abuse of this forced reboot to install a persistent backdoor. In addition the reboot causes a loss of forensic evidence in case of compromise.
Exploit of CVE-2024-20358 and CVE-2024-20359 - both 6.0 MEDIUM - could have a high impact on confidentiality and integrity.
CVE-2024-20353 is caused by incomplete error checking when parsing an HTTP header. An attacker sending a crafted HTTP request to a web server on a vulnerable device could cause a denial of service (DoS).
CVE-2024-20358 exists because of improper sanitisation of backup file content at restore time. An attacker could exploit the vulnerability locally by restoring a crafted backup file to an affected device which would allow the execution of arbitrary commands on the underlying Linux operating system as root.
CVE-2024-20359 exists because of improper validation of a file when it is read from system flash memory. An attacker could exploit the vulnerability locally by copying a crafted file to the disk0: file system of an affected device which would allow the attacker to execute arbitrary code on the affected device after the next reload of the device. The injected code could persist across reboots.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
Monitor/Detect
The CCB recommends organisations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
https://www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns