<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Adaptive Security Appliance (ASA) Software — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/adaptive-security-appliance-asa-software/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/adaptive-security-appliance-asa-software/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco ASA Logging Disabled via CLI</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-cisco-asa-logging-disabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-cisco-asa-logging-disabled/</guid><description>Detection of disabled logging functionality on a Cisco ASA device via CLI commands, indicating potential defense evasion by adversaries.</description><content:encoded><![CDATA[<p>This brief focuses on detecting the disabling of logging on Cisco ASA devices. Attackers, including malicious insiders, might disable logging to avoid detection and hide malicious activities within the network. This is achieved by using CLI commands to turn off or clear logging features. This detection is triggered by specific syslog message IDs (111010, 111008) linked to command executions, combined with suspicious commands, like &rsquo;no logging,&rsquo; &rsquo;logging disable,&rsquo; &lsquo;clear logging,&rsquo; or &rsquo;no logging host&rsquo;. The ability to disable logging on a firewall or security appliance represents a substantial attempt at defense evasion, enabling the attacker to operate without generating audit trails.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains access to the Cisco ASA device&rsquo;s CLI, potentially through stolen credentials or a compromised administrative account.</li>
<li>Authentication: The attacker authenticates to the ASA device, using valid credentials to gain privileged access.</li>
<li>Command Execution: The attacker executes commands via the CLI to modify the logging configuration.</li>
<li>Disable Logging: The attacker uses commands such as <code>no logging</code>, <code>logging disable</code>, <code>clear logging</code>, or <code>no logging host</code> to disable logging functionality.</li>
<li>Evasion: With logging disabled, the attacker can perform malicious activities without generating audit logs that would typically be captured by security monitoring systems.</li>
<li>Lateral Movement/Privilege Escalation: The attacker may attempt to move laterally within the network or escalate privileges, taking advantage of the reduced visibility.</li>
<li>Data Exfiltration/System Compromise: The attacker carries out their objectives, such as data exfiltration, system compromise, or network disruption, without being easily detected.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If logging is disabled on a Cisco ASA firewall, network defenders lose critical visibility into network traffic and security events. This can lead to delayed detection of security breaches, data exfiltration, and internal reconnaissance activities. Successfully disabling logging allows attackers to operate undetected, significantly increasing the dwell time and potential damage caused by a breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect the execution of commands disabling logging on Cisco ASA devices in your SIEM and tune for your environment.</li>
<li>Configure your Cisco ASA devices to forward syslog data, specifically message IDs 111008 and 111010, to your SIEM as outlined in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Review historical logs for instances of logging being disabled to identify potential past compromises using the provided <code>cisco_asa</code> data source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>cisco</category><category>asa</category></item></channel></rss>