Back to Feed
Nation-stateApr 24, 2026

US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor

US federal agency's Cisco firewall infected with Firestarter backdoor tied to Chinese espionage campaign.

Summary

A China-linked state-sponsored threat actor (UAT-4356) exploited two zero-day vulnerabilities in Cisco ASA and Secure Firewall devices to deploy the Firestarter backdoor, which provides persistent remote access and resists firmware patching. At least one US federal agency was compromised; CISA issued updated Emergency Directive 25-03 requiring agencies to verify infections via core dumps and hard-reset affected devices by April 30, 2026.

Full text

At least one US federal agency was infected with a backdoor as part of a widespread China-linked espionage campaign targeting Cisco firewalls. In May 2024, Cisco patched two vulnerabilities in its Adaptive Security Appliance (ASA) firewall platform that had been exploited as zero-days in a state-sponsored campaign tracked as ArcaneDoor. A year later, the company fixed two more zero-days linked to the same campaign, tracked as CVE-2025-20333 and CVE-2025-20362, and impacting the VPN web server of ASA and Secure Firewall Threat Defense (FTD) software. In September 2025, the US cybersecurity agency CISA issued Emergency Directive 25-03 (ED 25-03), urging federal agencies to patch vulnerable Cisco devices in their environments immediately. In November, CISA updated its guidance to recommend additional mitigation actions. On Thursday, the agency updated ED 25-03 again, warning that patching vulnerable Cisco firewall devices did not remove malware deployed on them. Per the updated directive, federal agencies should upload device core dumps to the Malware Next Gen portal to verify whether they have been compromised, and notify CISA immediately if they have been, or apply the available patches if needed.Advertisement. Scroll to continue reading. The requirement applies to Firepower 1000, 2100, 4100, 9300 series and Secure Firewall 200, 1200, 3100, 4200, and 6100 series devices. All checks and updates should be performed by 11:59 PM EST on April 24, 2026, and devices should be hard-reset by April 30, CISA’s directive mandates. CISA’s updated directive is accompanied by instructions on the core dumps and by a deep dive into the Firestarter backdoor, which was identified as the malware used in these attacks. According to CISA, at least one federal agency was infected with Firestarter through the exploitation of a Firepower device vulnerable to CVE-2025-20333 and CVE-2025-20362. The backdoor is not removed by firmware updates, and devices compromised before patching remain vulnerable, it warns. Firestarter was deployed before September 25, persisted through remediation, and provided the attackers with remote access and control of the vulnerable firewall. “Firestarter attempts to install a hook—a way to intercept and modify normal operations—within Lina, the device’s core engine for network processing and security functions. This hook enables the execution of arbitrary shell code provided by the APT actors, including the deployment of Line Viper,” CISA explains. The backdoor resembles the RayInitiator bootkit, a previously detailed component of the ArcaneDoor campaign, and achieves persistence by modifying the mount list for Cisco Service Platform (CSP), which allows programs to execute during boot, Cisco explains. After a reboot, Firestarter restores the original list and removes the trojanized copy, meaning that the implant can be removed through a hard reboot, which involves unplugging the device from power, the company says. Cisco has attributed the attacks to UAT-4356, a state-sponsored threat actor focused on espionage, and has published a fresh advisory on CVE-2025-20333 and CVE-2025-20362’s continuous exploitation. Related: Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities Related: Cisco Patches Critical Vulnerabilities in Webex, ISE Related: Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says Related: FBI Warns of Data Security Risks From China-Made Mobile Apps Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Luxury Cosmetics Giant Rituals Discloses Data BreachApple Patches iOS Flaw Allowing Recovery of Deleted ChatsRecent Microsoft Defender Vulnerability Exploited as Zero-DayNew Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention Mirai Botnet Targets Flaw in Discontinued D-Link RoutersNorth Korean Hackers Use AppleScript, ClickFix in Fresh macOS AttacksOracle Patches 450 Vulnerabilities With April 2026 CPUDozens of Malicious Crypto Apps Land in Apple App Store Latest News Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in USVulnerabilities Patched in CrowdStrike, Tenable ProductsBitwarden NPM Package Hit in Supply Chain AttackCopperhelm Raises $7 Million for Agentic Cloud Security PlatformCloudsmith Raises $72 Million in Series C FundingChinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude MythosRilian Raises $17.5 Million for AI-Native Security OrchestrationThe Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveClaroty has appointed John Ryan as Vice President of Worldwide Partner Ecosystem.Irving Bruckstein has been appointed Chief Executive Officer at Cyber A.I. Group.Anti-ransomware platform Halcyon has named Kirstjen Nielsen and Chris Inglis as Strategic Advisors.More People On The MoveExpert Insights Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) Flipboard Reddit Whatsapp Whatsapp Email

Indicators of Compromise

  • cve — CVE-2025-20333
  • cve — CVE-2025-20362
  • malware — Firestarter
  • malware — Line Viper
  • malware — RayInitiator

Entities

Cisco (vendor)UAT-4356 (threat_actor)ArcaneDoor (campaign)Cisco Adaptive Security Appliance (ASA) (product)Cisco Secure Firewall Threat Defense (FTD) (product)