CISA and NCSC Release Directives to Address Multiple Cisco Platforms Exploited by Threat Actors

code

Context

CISA has released Emergency Directive 25-03 in response to an advanced threat actor actively exploiting zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) devices. This alert comes as the United Kingdom National Cyber Security Centre releases a parallel advisory warning of active exploitation. This persistent threat utilizes new malware strains, RayInitiator and LINE VIPER, to maintain control and potentially exfiltrate data from compromised networks. Additionally, the campaign comes alongside a separate high-severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software, which could allow a remote attacker to execute code as root or cause a Denial of Service (DoS) condition

Sector Impact Assessment

Any organizations, including those in retail and hospitality that use Cisco ASA or Cisco IOS/IOS XE networking devices, are at significant risk of network compromise and service disruption. While Cisco has released software updates to address both issues, all organizations are strongly urged to apply the vendor’s recommended remediation immediately and replace obsolete, end-of-life devices to mitigate the significant risk to network integrity.

Analysis

The campaign targeting Cisco ASA devices is an escalation of a previously reported threat, with the new RayInitiator and LINE VIPER malware exhibiting greater sophistication and detection evasion capabilities. CISA’s directive requires federal agencies to prioritize the immediate disconnection of end-of-support devices and apply security updates to all in-service ASA models, acknowledging the alarmingly easy exploitability and persistent nature of the zero-day flaws. Concurrently, a separate, widespread vulnerability in the SNMP subsystem of Cisco IOS and IOS XE software presents an additional high-risk entry point, affecting devices like the Cisco Catalyst 9300 Series Switches. This SNMP flaw, which impacts all SNMP versions, can be exploited by an authenticated remote attacker to cause a DoS or gain root-level control of the system.

More Recent Blog Posts