<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ASA — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/asa/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 05:43:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/asa/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</link><pubDate>Fri, 24 Apr 2026 05:43:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</guid><description>Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.</description><content:encoded><![CDATA[<p>A cluster of vulnerabilities affects Cisco ASA (Adaptive Security Appliance), Cisco Secure Firewall Threat Defense, Cisco IOS, Cisco IOS XE, and Cisco IOS XR. A remote attacker, either authenticated or anonymous, can exploit these vulnerabilities to bypass authentication mechanisms and execute arbitrary code with administrator privileges. The broad scope of affected products, ranging from security appliances to core networking infrastructure, makes this a critical issue for organizations relying on Cisco technology. Successful exploitation could lead to widespread network compromise and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Cisco device (ASA, Firewall Threat Defense, IOS, IOS XE, or IOS XR).</li>
<li>Attacker exploits a vulnerability allowing authentication bypass.</li>
<li>Upon successful authentication bypass, the attacker gains unauthorized access to the device.</li>
<li>Attacker leverages another vulnerability on the compromised system to inject and execute arbitrary code.</li>
<li>The code executes with administrator privileges, granting the attacker full control over the device.</li>
<li>Attacker uses the compromised device as a pivot point to move laterally within the network.</li>
<li>Attacker compromises additional systems and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to complete compromise of affected Cisco devices, allowing attackers to gain full administrative control. This can result in significant data breaches, service disruptions, and the potential for lateral movement within the network to compromise other critical systems. The broad range of affected Cisco products means a wide array of organizations are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Consult Cisco&rsquo;s security advisories for specific vulnerability details and apply the appropriate patches or mitigations as soon as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category></item><item><title>UAT-4356 FIRESTARTER Backdoor Targeting Cisco Firepower Devices</title><link>https://feed.craftedsignal.io/briefs/2026-04-uat-4356-firestarter/</link><pubDate>Thu, 23 Apr 2026 15:11:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-uat-4356-firestarter/</guid><description>UAT-4356 is actively targeting Cisco Firepower devices running FXOS, exploiting CVE-2025-20333 and CVE-2025-20362 to deploy the FIRESTARTER backdoor which allows remote access and control by injecting malicious shellcode into the LINA process.</description><content:encoded><![CDATA[<p>Cisco Talos reported that UAT-4356 continues to actively target Cisco Firepower devices running the Firepower eXtensible Operating System (FXOS). In early 2024, Cisco Talos attributed the ArcaneDoor campaign to UAT-4356, a state-sponsored actor focused on gaining access to network perimeter devices for espionage. The actor exploits n-day vulnerabilities CVE-2025-20333 and CVE-2025-20362 to gain unauthorized access to vulnerable devices. Upon successful exploitation, UAT-4356 deploys a custom-built backdoor called &ldquo;FIRESTARTER,&rdquo; which shares technical capabilities with RayInitiator&rsquo;s Stage 3 shellcode. FIRESTARTER enables remote access and the execution of arbitrary code within the LINA process, a core component of Cisco&rsquo;s ASA and FTD appliances. This allows the attackers to maintain persistent access to compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>UAT-4356 exploits CVE-2025-20333 and/or CVE-2025-20362 on Cisco Firepower devices running FXOS to gain initial access.</li>
<li>The attacker manipulates the CSP_MOUNT_LIST to establish persistence for the FIRESTARTER backdoor.</li>
<li>The FIRESTARTER backdoor is written to <code>/opt/cisco/platform/logs/var/log/svc_samcore.log</code> and the CSP_MOUNT_LIST is updated to copy itself to <code>/usr/bin/lina_cs</code>.</li>
<li>After a graceful reboot, FIRESTARTER is executed from <code>/usr/bin/lina_cs</code>.</li>
<li>FIRESTARTER restores the original CSP_MOUNT_LIST from <code>/tmp/CSP_MOUNTLIST.tmp</code> and removes the temporary copy and the trojanized <code>/usr/bin/lina_cs</code> file from disk.</li>
<li>FIRESTARTER reads the LINA process’ memory, searching for specific byte sequences to verify memory layout.</li>
<li>FIRESTARTER copies the next stage shellcode to the last 0x200 bytes of the &ldquo;libstdc++.so&rdquo; memory region.</li>
<li>The attacker overwrites an internal data structure in the LINA process to replace a pointer to a legitimate WebVPN XML handler function with the address of the malicious shellcode. This allows execution of arbitrary shellcode received via WebVPN requests.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Cisco Firepower devices allow UAT-4356 to gain a foothold on network perimeters for espionage. Successful exploitation and deployment of the FIRESTARTER backdoor enable attackers to execute arbitrary shellcode, potentially leading to data exfiltration, further network compromise, or disruption of services. The number of victims is currently unknown, but this campaign targets network perimeter devices, which could impact organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the file integrity monitoring rule to detect the creation or modification of <code>/usr/bin/lina_cs</code> and <code>/opt/cisco/platform/logs/var/log/svc_samcore.log</code> (see &ldquo;File Creation in Suspicious Directory&rdquo;).</li>
<li>Apply software upgrade recommendations outlined in Cisco&rsquo;s Security Advisory to mitigate CVE-2025-20333 and CVE-2025-20362.</li>
<li>Monitor network traffic for WebVPN requests containing unexpected XML payloads that might be used to trigger the FIRESTARTER backdoor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>uat-4356</category><category>firestarter</category><category>cisco</category><category>backdoor</category><category>network</category><category>espionage</category></item></channel></rss>