In April 2024, Cisco disclosed that a nation-state threat actor, which it tracks as UAT4356 (also known as STORM-1849 by Microsoft), was exploiting two zero-day vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) software. The targeted flaws, CVE-2024-20353 and CVE-2024-20359, were used in a sophisticated espionage campaign aimed at government and critical infrastructure entities. The attackers chained these vulnerabilities to gain initial access, execute code, and establish persistent backdoors on critical network infrastructure. This incident highlights the ongoing trend of advanced persistent threats (APTs) targeting edge network devices as a primary vector for infiltrating secure networks.
The threat actor UAT4356 demonstrated a high degree of sophistication, conducting highly targeted attacks. The campaign's objective appears to be espionage, focusing on organizations of strategic importance. By compromising edge security appliances like Cisco ASA and FTD, the attackers gain a powerful foothold within the target network, allowing them to monitor, intercept, and exfiltrate traffic, as well as pivot to other internal systems.
The attack chain involved two key vulnerabilities:
The attackers used these vulnerabilities to deploy custom malware implants, which were designed to be stealthy and maintain access even after the device was rebooted. This is a classic APT tactic for long-term intelligence gathering.
T1190 - Exploit Public-Facing Application: The actor exploited CVE-2024-20359 on internet-facing Cisco devices.T1068 - Exploitation for Privilege Escalation: The actor likely used CVE-2024-20353 to escalate privileges to root.T1543.003 - Create or Modify System Process: Windows Service: The actor established persistence by creating malicious system services or modifying existing ones.T1105 - Ingress Tool Transfer: The actor downloaded additional malware and tools to the compromised devices.Compromise of a core network security device like a Cisco ASA/FTD firewall has severe consequences:
No specific Indicators of Compromise (IOCs) were provided in the source articles.
Security teams may want to hunt for the following patterns which could indicate related activity:
Cisco ASA/FTD Syslog/ngfw/var/log/Software Update technique.Network Isolation technique.Applying the security patches from Cisco is the most effective way to prevent exploitation of these vulnerabilities.
Mapped D3FEND Techniques:
Segmenting the network can limit the blast radius if an edge device is compromised, preventing lateral movement.
The primary and most urgent countermeasure is to apply the security patches released by Cisco for CVE-2024-20353 and CVE-2024-20359. Due to the targeted nature of the attacks by a nation-state actor, any organization using vulnerable Cisco ASA or FTD devices, especially those in government or critical infrastructure sectors, must assume they are a potential target. Patches should be deployed under emergency change procedures. Use Cisco's security advisories to identify the correct software versions for your specific hardware models. After patching, verify the software version to confirm the update was successful. This action directly closes the vulnerabilities used for initial access and persistence, providing the most definitive protection against this specific threat campaign.
For organizations concerned about potential compromise prior to patching, performing system file analysis is a critical incident response step. This involves capturing a snapshot of the device's file system and configuration and comparing it against a known-good baseline or factory image. Look for any unauthorized or unexpected files, especially in directories that allow execution. Pay close attention to file modification dates and permissions. Cisco provides tools and procedures for checking the integrity of system images. Automate this process where possible to perform regular integrity checks. This technique is vital for detecting the persistence mechanisms used by actors like UAT4356, which are designed to survive reboots and remain hidden.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats