So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/), first things first:
DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)
"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."
This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.
What you should do is (I'll quote):
diagnostic-cli command.enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.show versionverify /SHA-512 system:memory/textdebug menu memory 8Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.
I will repeat (without shouting this time):
Patching is not a fix!
"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."
There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_attacks_event_response), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.
#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity
Final question for anyone still reading: why the debug menu memory 8? What does it do?
Cisco is aware of new activity targeting certain Cisco Adaptive Security Appliances (ASA) 5500-X Series and has released three CVEs related to the event. We assess with high confidence this activity is related to same threat actor as ArcaneDoor in 2024.