CISA Breach - Cisco Vulnerability Exploited by FIRESTARTER, Backdoor Survives Patches

CISA has confirmed a breach involving FIRESTARTER malware, which exploits Cisco vulnerabilities, allowing persistent access even after patches. Federal agencies must act quickly to mitigate risks.

BreachesHIGHUpdated: Published: πŸ“° 2 sources
Featured image for CISA Breach - Cisco Vulnerability Exploited by FIRESTARTER, Backdoor Survives Patches

Original Reporting

TRThe Record

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯A group of hackers found a way to sneak into a government computer system using a special trick that lets them stay inside even after the system gets updated. They used a sneaky program called FIRESTARTER, which is hard to get rid of, so the government has to act fast to fix it.

What Happened

In September 2025, a U.S. federal agency was breached by state-sponsored hackers exploiting vulnerabilities in Cisco firewalls, specifically through the use of a malware called FIRESTARTER. This backdoor enables the attackers to maintain access to compromised devices without needing to re-exploit the original vulnerabilities, even after patches are applied. CISA confirmed that suspicious connections were detected on a Cisco Firepower device, leading to the discovery of FIRESTARTER during a forensic engagement.

The Flaw

The breach was facilitated by two vulnerabilities: CVE-2025-30333, a remote code execution flaw in the VPN web server component, and CVE-2025-20362, which allowed unauthorized access. These vulnerabilities were patched by Cisco in September 2025, but the persistence mechanism of FIRESTARTER allows it to survive firmware updates and standard reboots, making it particularly dangerous.

What's at Risk

FIRESTARTER manipulates the Cisco Service Platform mount list, ensuring that it can reinstate itself after a reboot. This means that a standard software reboot does not remove the malware, and only a hard rebootβ€”physically disconnecting the device from powerβ€”can clear it from memory. The malware can intercept network requests used for VPN authentication, providing attackers with a backdoor into the device and exposing sensitive information, including administrative credentials and encryption keys.

Patch Status

CISA and Cisco have issued updated advisories and directives to federal agencies, mandating audits of their Cisco firewall infrastructure and submission of device memory snapshots for analysis. Cisco has released software updates to address the persistence mechanism, but they recommend reimaging affected devices if compromise is suspected.

Immediate Actions

Federal agencies are required to confirm the completion of malware checks by midnight on Friday and provide an inventory of Cisco Firepower devices by May 1. CISA has emphasized that previous security updates alone are insufficient to remove the malware or eliminate the threat actors from compromised systems. Agencies must follow the updated directives to ensure full remediation.

Source Perspectives

  • Technical: The malware FIRESTARTER is designed to survive standard security measures, posing a significant challenge for remediation efforts. (Source: CyberScoop)
  • Business Impact: The persistence of FIRESTARTER highlights the vulnerabilities in network perimeter devices, which are critical for enforcing security boundaries in organizations. (Source: CyberScoop)
  • Policy: The joint advisory from CISA and the UK’s NCSC underscores the international cooperation in addressing state-sponsored cyber threats targeting government and critical infrastructure. (Source: CyberScoop)

πŸ”’ Pro Insight

The persistence of FIRESTARTER poses a unique challenge for cybersecurity professionals, as traditional patching methods may not suffice to eliminate the threat. Organizations must adopt more comprehensive remediation strategies.

Related Pings