🕳️ Vulnerabilities & CVEs

Firestarter Malware: Cisco Patches Fail [Deep Dive]

Cisco users, take note: a persistent new malware, dubbed Firestarter, is making a mockery of your security updates. This isn't just another bug; it's a sophisticated backdoor designed to survive patching, leaving even the most diligent administrators exposed.

Schematic illustration of a network firewall with a glowing red padlock icon, symbolizing a security breach.

⚡ Key Takeaways

  • Firestarter malware evades Cisco firewall updates, achieving persistence across patches. 𝕏
  • The threat actor, UAT-4356, uses Firestarter for long-term cyberespionage. 𝕏
  • Initial access is gained through vulnerabilities like CVE-2025-20333 and CVE-2025-20362, followed by Line Viper for credential theft. 𝕏
  • Firestarter hooks into core Cisco processes and manipulates boot files to ensure reinstallation and execution. 𝕏
  • Cisco recommends reimaging devices, but temporary cold restarts may remove the malware with risks. 𝕏
Maya Thompson
Written by

Maya Thompson

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.