Firestarter Malware: Cisco Patches Fail [Deep Dive]
Cisco users, take note: a persistent new malware, dubbed Firestarter, is making a mockery of your security updates. This isn't just another bug; it's a sophisticated backdoor designed to survive patching, leaving even the most diligent administrators exposed.
⚡ Key Takeaways
- Firestarter malware evades Cisco firewall updates, achieving persistence across patches. 𝕏
- The threat actor, UAT-4356, uses Firestarter for long-term cyberespionage. 𝕏
- Initial access is gained through vulnerabilities like CVE-2025-20333 and CVE-2025-20362, followed by Line Viper for credential theft. 𝕏
- Firestarter hooks into core Cisco processes and manipulates boot files to ensure reinstallation and execution. 𝕏
- Cisco recommends reimaging devices, but temporary cold restarts may remove the malware with risks. 𝕏
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by Bleeping Computer