<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>FTD on Thoughts and Ramblings by Mike</title><link>https://mikedent.io/tags/ftd/</link><description>Recent content in FTD on Thoughts and Ramblings by Mike</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>Mike Dent</copyright><lastBuildDate>Thu, 25 Apr 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://mikedent.io/tags/ftd/index.xml" rel="self" type="application/rss+xml"/><item><title>Zero Day Threat - Cisco Remote Access on ASA/FTD</title><link>https://mikedent.io/post/2024/04/zero-day-threat-cisco-remote-access-on-asa-ftd/</link><pubDate>Thu, 25 Apr 2024 00:00:00 +0000</pubDate><guid>https://mikedent.io/post/2024/04/zero-day-threat-cisco-remote-access-on-asa-ftd/</guid><description>
&lt;p&gt;Cisco recently patched two critical vulnerabilities in their firewall products, discovered after probable nation-state actors targeted them in a campaign dubbed &amp;quot;Arcane Door&amp;quot;. These zero-day vulnerabilities, found in devices running ASA and FTD software, were exploited to implant malware and possibly steal data. Cisco released three patches and has tracked the hacking group under UAT4356 and STORM-1849 by Microsoft. These flaws, involving HTTP header parsing and a legacy VPN client preloading capability, allowed attackers root-level access, emphasizing the need for immediate patching and security upgrades.&lt;/p&gt;</description></item></channel></rss>