<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>ASA on Thoughts and Ramblings by Mike</title><link>https://mikedent.io/tags/asa/</link><description>Recent content in ASA on Thoughts and Ramblings by Mike</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>Mike Dent</copyright><lastBuildDate>Thu, 25 Apr 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://mikedent.io/tags/asa/index.xml" rel="self" type="application/rss+xml"/><item><title>Zero Day Threat - Cisco Remote Access on ASA/FTD</title><link>https://mikedent.io/post/2024/04/zero-day-threat-cisco-remote-access-on-asa-ftd/</link><pubDate>Thu, 25 Apr 2024 00:00:00 +0000</pubDate><guid>https://mikedent.io/post/2024/04/zero-day-threat-cisco-remote-access-on-asa-ftd/</guid><description>
&lt;p&gt;Cisco recently patched two critical vulnerabilities in their firewall products, discovered after probable nation-state actors targeted them in a campaign dubbed &amp;quot;Arcane Door&amp;quot;. These zero-day vulnerabilities, found in devices running ASA and FTD software, were exploited to implant malware and possibly steal data. Cisco released three patches and has tracked the hacking group under UAT4356 and STORM-1849 by Microsoft. These flaws, involving HTTP header parsing and a legacy VPN client preloading capability, allowed attackers root-level access, emphasizing the need for immediate patching and security upgrades.&lt;/p&gt;</description></item><item><title>Cisco ASA Dropped Traffic Notice: Critical Bug Alert</title><link>https://mikedent.io/post/2017/03/cisco-asa-dropped-traffic-notice/</link><pubDate>Fri, 31 Mar 2017 00:00:00 +0000</pubDate><guid>https://mikedent.io/post/2017/03/cisco-asa-dropped-traffic-notice/</guid><description>
&lt;p&gt;Cisco seems to be having a rough go of it lately with bugs that have a time bomb for certain hardware and software.  Following up on the Signal Component &lt;a href="http://www.cisco.com/c/en/us/support/docs/field-notices/642/fn64253.html"&gt;issues&lt;/a&gt; –  that plagued a large number of product lines (And in Cisco’s defense affected more than just Cisco – other vendors are affetected).  I’m still waiting to find out when my Meraki MX84 will be replaced on that one 🙂&lt;/p&gt;
&lt;p&gt;Yesterday, Cisco released another &lt;a href="http://www.cisco.com/c/en/us/support/docs/field-notices/642/fn64291.html"&gt;Field Notice&lt;/a&gt; as well as a &lt;a href="http://blogs.cisco.com/security/urgent-proactive-customer-notification-asa"&gt;blog post&lt;/a&gt;, this time affecting a good number of ASA code versions dating back to 9.1.x, and certain FirePower versions.  The Field Notice states that all appliances are affected, so this is not a hardware issue like the Signal Component, but a software bug.    After around ~ +213 days, the appliance will just start to stop passing network traffic.&lt;/p&gt;</description></item></channel></rss>