🕳️ Vulnerabilities & CVEs

FIRESTARTER Malware Survives Cisco Patches [Analysis]

Cisco devices are under siege from FIRESTARTER, a stealthy backdoor that clings to compromised systems even after security patches are applied. This isn't just a glitch; it's a fundamental challenge to patch management.

Diagram showing a network device with a red warning symbol and a small ghost-like figure representing malware.

⚡ Key Takeaways

  • FIRESTARTER backdoor malware can persist on Cisco devices even after security patches are applied. 𝕏
  • The malware exploits vulnerabilities (CVE-2025-20333, CVE-2025-20362) and uses a bootkit mechanism for resilience. 𝕏
  • A full reimaging of the device or a hard power cycle is recommended for removal, as standard reboots are insufficient. 𝕏
Maya Thompson
Written by

Maya Thompson

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.