ArcaneDoor Attack (Cisco ASA Zero-Day)
What is the Attack? | Cisco has disclosed a state-sponsored espionage campaign targeting Cisco Adaptive Security Appliances (ASA), which are widely deployed for firewall, VPN, and security functions.
This campaign highlights a sustained effort by sophisticated adversaries to weaponize zero-day flaws in widely deployed Cisco security appliances, with the goal of espionage and long-term persistence. |
What is the recommended Mitigation? |
|
What FortiGuard Coverage is available? |
|
Outbreak Alert
Critical zero-day vulnerabilities affecting Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD) software have been actively exploited in the wild. The campaign is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution on ASAs, as well as manipulating read-only memory (ROM) to persist through reboot and system upgrade. This activity presents a significant risk to victim networks.
Additional Resources
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices (talosintelligence.com)
Cisco Event Response: Attacks Against Cisco Firewall Platforms
ED 25-03: Identify and Mitigate Potential Compromise of Cisco Devices | CISA