Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":3110,"date":"2024-05-06T21:54:34","date_gmt":"2024-05-06T21:54:34","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/"},"modified":"2024-05-06T21:54:34","modified_gmt":"2024-05-06T21:54:34","slug":"cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/","title":{"rendered":"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target"},"content":{"rendered":"

The Year of the Dragon has seen some notable events so far: a total eclipse, Facebook\u2019s 20th anniversary, and another Taylor Swift streaming record. But 2024 has also become the Year of the Hardware Vulnerability, with multiple VPNs and firewalls suffering zero-day vulnerabilities that bad actors are actively exploiting.<\/p>\n

On April 24, Cisco issued a warning that a nation-state supported threat actor had compromised its Adaptive Security Appliances (ASA). ASA integrates a firewall and VPN with other security features. This campaign, known as ArcaneDoor, involved the exploitation of two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) that targeted government networks worldwide.<\/p>\n

The threat actor deployed two backdoors:<\/p>\n

Line Dancer allowed them to run custom malware in the memory of network appliances, spy on network traffic, and steal data.
\nLine Runner gave them persistent access to target devices, even after reboots or updates.<\/p>\n

As of this writing, the initial attack vector is unknown. This hacking campaign may be targeting devices other than the ASA, exploiting other unknown flaws to access and exploit the Cisco ASA vulnerability.<\/p>\n

Another day, another CVECisco\u2019s disclosure and warning about the ArcaneDoor hacking campaign comes at a time when critical CVEs have been identified for Ivanti, SonicWall, Fortinet, Palo Alto Networks, and other Cisco VPN solutions.<\/p>\n

This recurring pattern highlights a concerning trend: threat actors are specifically targeting security appliances like firewalls and VPNs, exploiting their vulnerabilities in an attempt to gain access to the very environments they are designed to protect. These attacks indicate that the issue is not limited to any one vendor. Rather, it is the underlying legacy architecture of the devices that makes them lucrative targets.<\/p>\n

Decoding the architectural flawsThe big question on security and network architects\u2019 minds today: why are perimeter-based security and hub-and-spoke network architecture susceptible to attacks? Decades ago, firewalls and VPNs were vital parts of an organization\u2019s security. Employees mainly worked in offices, there were no smart lights or smart printers, and sophisticated cyberattacks on employees were more fiction than reality. Today\u2019s complex, advanced cyberattacks weren\u2019t yet widespread.<\/p>\n

Today’s organizations are highly distributed and dynamic. The internet is the corporate network, with users, workloads, and IoT\/OT devices connecting from various locations. By design, firewalls and VPNs have public-facing IP addresses that sit on the public internet so authorized users can traverse the web and find the entry points into the organization\u2019s environment.<\/p>\n

This architectural flaw is where the problem lies: anyone, including threat actors, can discover these entry points. Even more concerning, everything within a traditional network is considered “trusted.” This enables threat actors to establish a foothold in the network and move laterally, compromising the entire environment.<\/p>\n

How to protect yourself with zero trust securityThe best defense against zero-day attacks is to embrace zero trust security. Zero trust architecture is inherently different from traditional architectures that rely on firewalls and VPNs. Based on the principle of least privilege, it minimizes the internal and external attack surface, terminates and fully inspects all connections, and establishes one-to-one connectivity between authenticated users and applications without exposing the enterprise network.<\/p>\n

An effective zero trust approach drastically reduces the risk of successful exploits as well as the impact of a compromise.<\/p>\n

A cloud native, proxy-based zero trust architecture like the Zscaler Zero Trust Exchange:<\/p>\n

Minimizes the attack surface by eliminating firewalls, VPNs, and public-facing IP addresses. It allows no inbound connections and hides applications behind a zero trust cloud.
\nStops compromise by inspecting all traffic, including encrypted traffic, at scale. This enables policy enforcement and real-time threat prevention.
\nEliminates lateral threat movement by connecting entities to individual IT resources instead of the entire network.
\nBlocks data loss by enforcing policies across all potential leakage paths, including encrypted traffic. This ensures the protection of data in motion, at rest, and in use.<\/p>\n

Best practices to protect against zero-day attacksThe Zscaler ThreatLabz research team recommends these best practices to protect your organization against exploits:<\/p>\n

Minimize the attack surface. Make applications (including vulnerable VPNs) invisible to the internet, ensuring that attackers cannot gain initial access.
\nPrevent initial compromise. Inspect all traffic inline to automatically stop zero-day exploits, malware, or other sophisticated threats.
\nEnforce least-privileged access. Restrict permissions for users, traffic, systems, and applications with identity and context, ensuring only authorized users can access named resources.
\nBlock unauthorized access. Use strong multifactor authentication (MFA) to validate user access requests.
\nEliminate lateral movement. Connect users directly to applications, not the network, to limit the blast radius of a potential incident.
\nShut down compromised users and insider threats. Enable inline inspection and monitoring to detect compromised users with access to your network, private apps, and data.
\nStop data loss. Inspect data in motion and at rest to prevent active data theft during an attack.
\nDeploy active defenses. Use deception technology with decoys, and perform daily threat hunting to derail and stop attacks in real time.
\nTest your security posture. Obtain regular third-party risk assessments and conduct purple team activities to identify and fix gaps in your security. Ask your service providers and technology partners to do the same, and share findings with your security team.<\/p>\n

The road aheadThe increased targeting of VPNs and firewalls by threat actors highlights the flaws of traditional perimeter-based architectures. With lucrative gains to be had, these attacks will continue. Organizations must prioritize patching critical vulnerabilities as soon as possible.<\/p>\n

However, to truly stay ahead of zero-day attacks, adopting zero trust is the most effective approach. A zero trust architecture will enable organizations to minimize the attack surface, enforce strict access controls, and continuously monitor and authenticate users and devices. This proactive approach to security will help mitigate zero-day risks and ensure a more robust, resilient defense in the future.<\/p>\n

Referenceshttps:\/\/www.wired.com\/story\/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks\/
\nhttps:\/\/blog.talosintelligence.com\/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices\/<\/p>\n

If you\u2019re concerned about how these vulnerabilities could affect your organization, contact us at ReplaceFWVPN@zscaler.com for a free external attack surface assessment as well as an expert consultation on how you can migrate from legacy architectures to zero trust.\u00a0\u00a0<\/p>\n

\u200b<\/p>\n

The big question on security and network architects\u2019 minds today: why are perimeter-based security and hub-and-spoke network architecture susceptible to attacks? Decades ago, firewalls and VPNs were vital parts of an organization\u2019s security. Employees mainly worked in offices, there were no smart lights or smart printers, and sophisticated cyberattacks on employees were more fiction than reality. Today\u2019s complex, advanced cyberattacks weren\u2019t yet widespread.<\/p>\n

\u00a0<\/p>\n

Today’s organizations are highly distributed and dynamic. The internet is the corporate network, with users, workloads, and IoT\/OT devices connecting from various locations.\u00a0By design, firewalls and VPNs have public-facing IP addresses that sit on the public internet so authorized users can traverse the web and find the entry points into the organization\u2019s environment.<\/p>\n

\u00a0<\/p>\n

This architectural flaw is where the problem lies: anyone, including threat actors, can discover these entry points. Even more concerning, everything within a traditional network is considered “trusted.” This enables threat actors to establish a foothold in the network and move laterally, compromising the entire environment.<\/p>\n

\u00a0<\/p>\n

<\/strong><\/p>\n

\u00a0[[{“value”:”The Year of the Dragon has seen some notable events so far: a total eclipse, Facebook\u2019s 20th anniversary, and another Taylor Swift streaming record. But 2024 has also become the Year of the Hardware Vulnerability, with multiple VPNs and firewalls suffering zero-day vulnerabilities that bad actors are actively exploiting.<\/p>\n

On April 24, Cisco issued a warning that a nation-state supported threat actor had compromised its Adaptive Security Appliances (ASA). ASA integrates a firewall and VPN with other security features. This campaign, known as ArcaneDoor, involved the exploitation of two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) that targeted government networks worldwide.<\/p>\n

The threat actor deployed two backdoors:<\/p>\n

Line Dancer allowed them to run custom malware in the memory of network appliances, spy on network traffic, and steal data.
\nLine Runner gave them persistent access to target devices, even after reboots or updates.<\/p>\n

As of this writing, the initial attack vector is unknown. This hacking campaign may be targeting devices other than the ASA, exploiting other unknown flaws to access and exploit the Cisco ASA vulnerability.<\/p>\n

Another day, another CVECisco\u2019s disclosure and warning about the ArcaneDoor hacking campaign comes at a time when critical CVEs have been identified for Ivanti, SonicWall, Fortinet, Palo Alto Networks, and other Cisco VPN solutions.<\/p>\n

This recurring pattern highlights a concerning trend: threat actors are specifically targeting security appliances like firewalls and VPNs, exploiting their vulnerabilities in an attempt to gain access to the very environments they are designed to protect. These attacks indicate that the issue is not limited to any one vendor. Rather, it is the underlying legacy architecture of the devices that makes them lucrative targets.<\/p>\n

Decoding the architectural flawsThe big question on security and network architects\u2019 minds today: why are perimeter-based security and hub-and-spoke network architecture susceptible to attacks? Decades ago, firewalls and VPNs were vital parts of an organization\u2019s security. Employees mainly worked in offices, there were no smart lights or smart printers, and sophisticated cyberattacks on employees were more fiction than reality. Today\u2019s complex, advanced cyberattacks weren\u2019t yet widespread.<\/p>\n

Today’s organizations are highly distributed and dynamic. The internet is the corporate network, with users, workloads, and IoT\/OT devices connecting from various locations. By design, firewalls and VPNs have public-facing IP addresses that sit on the public internet so authorized users can traverse the web and find the entry points into the organization\u2019s environment.<\/p>\n

This architectural flaw is where the problem lies: anyone, including threat actors, can discover these entry points. Even more concerning, everything within a traditional network is considered “trusted.” This enables threat actors to establish a foothold in the network and move laterally, compromising the entire environment.<\/p>\n

How to protect yourself with zero trust securityThe best defense against zero-day attacks is to embrace zero trust security. Zero trust architecture is inherently different from traditional architectures that rely on firewalls and VPNs. Based on the principle of least privilege, it minimizes the internal and external attack surface, terminates and fully inspects all connections, and establishes one-to-one connectivity between authenticated users and applications without exposing the enterprise network.<\/p>\n

An effective zero trust approach drastically reduces the risk of successful exploits as well as the impact of a compromise.<\/p>\n

A cloud native, proxy-based zero trust architecture like the Zscaler Zero Trust Exchange:<\/p>\n

Minimizes the attack surface by eliminating firewalls, VPNs, and public-facing IP addresses. It allows no inbound connections and hides applications behind a zero trust cloud.
\nStops compromise by inspecting all traffic, including encrypted traffic, at scale. This enables policy enforcement and real-time threat prevention.
\nEliminates lateral threat movement by connecting entities to individual IT resources instead of the entire network.
\nBlocks data loss by enforcing policies across all potential leakage paths, including encrypted traffic. This ensures the protection of data in motion, at rest, and in use.<\/p>\n

Best practices to protect against zero-day attacksThe Zscaler ThreatLabz research team recommends these best practices to protect your organization against exploits:<\/p>\n

Minimize the attack surface. Make applications (including vulnerable VPNs) invisible to the internet, ensuring that attackers cannot gain initial access.
\nPrevent initial compromise. Inspect all traffic inline to automatically stop zero-day exploits, malware, or other sophisticated threats.
\nEnforce least-privileged access. Restrict permissions for users, traffic, systems, and applications with identity and context, ensuring only authorized users can access named resources.
\nBlock unauthorized access. Use strong multifactor authentication (MFA) to validate user access requests.
\nEliminate lateral movement. Connect users directly to applications, not the network, to limit the blast radius of a potential incident.
\nShut down compromised users and insider threats. Enable inline inspection and monitoring to detect compromised users with access to your network, private apps, and data.
\nStop data loss. Inspect data in motion and at rest to prevent active data theft during an attack.
\nDeploy active defenses. Use deception technology with decoys, and perform daily threat hunting to derail and stop attacks in real time.
\nTest your security posture. Obtain regular third-party risk assessments and conduct purple team activities to identify and fix gaps in your security. Ask your service providers and technology partners to do the same, and share findings with your security team.<\/p>\n

The road aheadThe increased targeting of VPNs and firewalls by threat actors highlights the flaws of traditional perimeter-based architectures. With lucrative gains to be had, these attacks will continue. Organizations must prioritize patching critical vulnerabilities as soon as possible.<\/p>\n

However, to truly stay ahead of zero-day attacks, adopting zero trust is the most effective approach. A zero trust architecture will enable organizations to minimize the attack surface, enforce strict access controls, and continuously monitor and authenticate users and devices. This proactive approach to security will help mitigate zero-day risks and ensure a more robust, resilient defense in the future.<\/p>\n

Referenceshttps:\/\/www.wired.com\/story\/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks\/
\nhttps:\/\/blog.talosintelligence.com\/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices\/<\/p>\n

If you\u2019re concerned about how these vulnerabilities could affect your organization, contact us at ReplaceFWVPN@zscaler.com for a free external attack surface assessment as well as an expert consultation on how you can migrate from legacy architectures to zero trust.”}]]\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

The Year of the Dragon has seen some notable events […]<\/p>\n","protected":false},"author":0,"featured_media":3111,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-3110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zenith-zscaler"],"yoast_head":"\nCisco ASA Firewall Vulnerability: What to Do When Security Is a Target - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target\" \/>\n<meta property=\"og:description\" content=\"The Year of the Dragon has seen some notable events […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-06T21:54:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target\",\"datePublished\":\"2024-05-06T21:54:34+00:00\",\"dateModified\":\"2024-05-06T21:54:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/\"},\"wordCount\":2188,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg\",\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/\",\"name\":\"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg\",\"datePublished\":\"2024-05-06T21:54:34+00:00\",\"dateModified\":\"2024-05-06T21:54:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/","og_locale":"en_US","og_type":"article","og_title":"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target","og_description":"The Year of the Dragon has seen some notable events […]","og_url":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/","og_site_name":"JHC","article_published_time":"2024-05-06T21:54:34+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/"},"author":{"name":"","@id":""},"headline":"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target","datePublished":"2024-05-06T21:54:34+00:00","dateModified":"2024-05-06T21:54:34+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/"},"wordCount":2188,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg","articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/","url":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/","name":"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg","datePublished":"2024-05-06T21:54:34+00:00","dateModified":"2024-05-06T21:54:34+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/05\/Cisco-ASA-firewall-breach-blog-tile-img-700x467-DNIK1x.jpeg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/cisco-asa-firewall-vulnerability-what-to-do-when-security-is-a-target\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Cisco ASA Firewall Vulnerability: What to Do When Security Is a Target"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=3110"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3110\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/3111"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=3110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=3110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=3110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}