Cisco ASA and FTD Devices Targeted by Nation-State Group UAT4356 Using Zero-Day Flaws

Nation-State Actor UAT4356 Targets Cisco Firewalls with Zero-Day Exploits

CRITICAL
April 27, 2026
5m read
Threat ActorVulnerabilityCyberattack

Related Entities

Threat Actors

UAT4356STORM-1849

Products & Tech

Cisco Adaptive Security Appliance (ASA)Cisco Firepower Threat Defense (FTD)

CVE Identifiers

Full Report

Executive Summary

In April 2024, Cisco disclosed that a nation-state threat actor, which it tracks as UAT4356 (also known as STORM-1849 by Microsoft), was exploiting two zero-day vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) software. The targeted flaws, CVE-2024-20353 and CVE-2024-20359, were used in a sophisticated espionage campaign aimed at government and critical infrastructure entities. The attackers chained these vulnerabilities to gain initial access, execute code, and establish persistent backdoors on critical network infrastructure. This incident highlights the ongoing trend of advanced persistent threats (APTs) targeting edge network devices as a primary vector for infiltrating secure networks.

Threat Overview

The threat actor UAT4356 demonstrated a high degree of sophistication, conducting highly targeted attacks. The campaign's objective appears to be espionage, focusing on organizations of strategic importance. By compromising edge security appliances like Cisco ASA and FTD, the attackers gain a powerful foothold within the target network, allowing them to monitor, intercept, and exfiltrate traffic, as well as pivot to other internal systems.

Technical Analysis

The attack chain involved two key vulnerabilities:

  • CVE-2024-20353 (Persistent Local Code Execution): This vulnerability could allow an authenticated local attacker to execute arbitrary code with root privileges and have that code persist across reboots. While it requires initial access, it is a powerful tool for establishing long-term persistence.
  • CVE-2024-20359 (Command Injection): This vulnerability could allow an unauthenticated remote attacker to execute arbitrary commands. This was likely used for initial access, providing the foothold needed to then exploit the local code execution flaw for persistence.

The attackers used these vulnerabilities to deploy custom malware implants, which were designed to be stealthy and maintain access even after the device was rebooted. This is a classic APT tactic for long-term intelligence gathering.

MITRE ATT&CK Mapping

Impact Assessment

Compromise of a core network security device like a Cisco ASA/FTD firewall has severe consequences:

  • Espionage: The primary goal of the actor was espionage, meaning sensitive government and corporate data was likely targeted and exfiltrated.
  • Network Control: Full control over the firewall allows the attacker to manipulate traffic, bypass security policies, and launch further attacks on the internal network.
  • Loss of Trust: A breach of the primary security boundary device erodes trust in the network's integrity and can be extremely difficult and costly to fully remediate.
  • Operational Disruption: While espionage was the goal, the attacker's tools or remediation efforts could inadvertently cause network outages.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns which could indicate related activity:

Type
Log Source
Value
Cisco ASA/FTD Syslog
Description
Look for unexpected or unauthorized configuration changes, especially related to user accounts or access policies.
Type
Process Name
Value
Unusual processes running on the ASA/FTD
Description
Monitor the device's process list for any non-standard or suspicious processes.
Type
Network Traffic Pattern
Value
Outbound connections from the ASA/FTD device itself
Description
Similar to the PAN-OS issue, the firewall itself should not be making outbound connections to unknown IPs.
Type
File Path
Value
/ngfw/var/log/
Description
Check for suspicious scripts or binaries in system directories where they don't belong.

Detection & Response

  • Review Logs: Administrators should use Cisco's guidance to review device logs for any signs of compromise, such as unexplained reboots, new user accounts, or unexpected configuration changes.
  • Integrity Checks: Use Cisco's tools and guidance to perform integrity checks on the device's system image and configuration files to look for unauthorized modifications.
  • Network Monitoring: Monitor traffic originating from the ASA/FTD device itself for any suspicious outbound connections that could indicate a C2 channel.

Mitigation

  1. Patch Immediately: Apply the software updates provided by Cisco to all affected ASA and FTD devices. This is the only effective way to prevent exploitation. This is an application of D3FEND's Software Update technique.
  2. Harden Devices: Follow Cisco's hardening guides to reduce the attack surface of your network devices. This includes disabling unnecessary services and restricting management access.
  3. Network Segmentation: Implement network segmentation to limit the potential impact of a compromised edge device. An attacker who compromises a firewall should not have a direct path to critical internal assets. This is an application of D3FEND's Network Isolation technique.

Timeline of Events

1
April 27, 2026
This article was published

MITRE ATT&CK Mitigations

Applying the security patches from Cisco is the most effective way to prevent exploitation of these vulnerabilities.

Mapped D3FEND Techniques:

Segmenting the network can limit the blast radius if an edge device is compromised, preventing lateral movement.

Mapped D3FEND Techniques:

Regularly auditing device configurations and logs for unauthorized changes is key to detecting this type of attack.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The primary and most urgent countermeasure is to apply the security patches released by Cisco for CVE-2024-20353 and CVE-2024-20359. Due to the targeted nature of the attacks by a nation-state actor, any organization using vulnerable Cisco ASA or FTD devices, especially those in government or critical infrastructure sectors, must assume they are a potential target. Patches should be deployed under emergency change procedures. Use Cisco's security advisories to identify the correct software versions for your specific hardware models. After patching, verify the software version to confirm the update was successful. This action directly closes the vulnerabilities used for initial access and persistence, providing the most definitive protection against this specific threat campaign.

For organizations concerned about potential compromise prior to patching, performing system file analysis is a critical incident response step. This involves capturing a snapshot of the device's file system and configuration and comparing it against a known-good baseline or factory image. Look for any unauthorized or unexpected files, especially in directories that allow execution. Pay close attention to file modification dates and permissions. Cisco provides tools and procedures for checking the integrity of system images. Automate this process where possible to perform regular integrity checks. This technique is vital for detecting the persistence mechanisms used by actors like UAT4356, which are designed to survive reboots and remain hidden.

Sources & References

Major Cyber Attacks, Data Breaches & Ransomware Attacks in April 2024
Security and Compliance (securityandcompliance.com) May 1, 2024

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

nation-stateAPTCiscoUAT4356STORM-1849zero-dayvulnerabilityCVE-2024-20353CVE-2024-20359ASAFTD

📢 Share This Article

Help others stay informed about cybersecurity threats