FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
好的,我现在需要帮用户总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读这篇文章,理解其主要内容。 文章主要讲的是美国网络安全和基础设施安全局(CISA)披露了一起针对联邦 civilian agency 的 Cisco 设备的网络攻击事件。攻击者利用了名为 FIRESTARTER 的恶意软件,通过两个已修补的安全漏洞 CVE-2025-20333 和 CVE-2025-20362 进行入侵。FIRESTARTER 作为后门程序,能够在设备上持久存在,即使在固件更新后也能继续控制设备。此外,攻击者还部署了 LINE VIPER 工具包,进一步扩大了攻击范围。文章还提到中国黑客可能参与其中,并且他们正在转向使用隐蔽网络来隐藏自己的活动。 接下来,我需要将这些信息浓缩到100字以内。重点包括:FIRESTARTER 的功能、利用的漏洞、持久性机制、LINE VIPER 的作用以及中国黑客的可能关联。 可能会遇到的问题是如何在有限的字数内涵盖所有关键点而不遗漏重要信息。可能需要简化某些部分,比如合并关于 LINE VIPER 和 FIRESTARTER 的描述。 最后,确保语言简洁明了,直接描述事件的核心内容。 </think> 美国网络安全机构披露一起针对 Cisco 设备的攻击事件:未知联邦机构的 Cisco Firepower 设备于 2025 年 9 月被植入名为 FIRESTARTER 的恶意软件。该恶意软件利用已修补漏洞(CVE-2025-20333 和 CVE-2025-20362)作为后门,在设备上建立持久性控制,并与 LINE VIPER 工具包结合扩大攻击能力。尽管 Cisco 已发布补丁修复漏洞,但已感染设备仍需重新映像才能彻底清除威胁。 2026-4-24 17:6:0 Author: thehackernews.com(查看原文) 阅读量:24 收藏

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency's Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in September 2025 with malware called FIRESTARTER.

FIRESTARTER, per CISA and the U.K.'s National Cyber Security Centre (NCSC), is assessed to be a backdoor designed for remote access and control. It's believed to be deployed as part of a "widespread" campaign orchestrated by an advanced persistent threat (APT) actor to obtain access to Cisco Adaptive Security Appliance (ASA) firmware by exploiting now-patched security flaws such as -

  • CVE-2025-20333 (CVSS score: 9.9) - An improper validation of user-supplied input vulnerability that could allow an authenticated, remote attacker with valid VPN user credentials to execute arbitrary code as root on an affected device by sending crafted HTTP requests.
  • CVE-2025-20362 (CVSS score: 6.5) - An improper validation of user-supplied input vulnerability that could allow an unauthenticated, remote attacker to access restricted URL endpoints without authentication by sending crafted HTTP requests.

"FIRESTARTER can persist as an active threat on Cisco devices running ASA or Firepower Threat Defense (FTD) software, maintaining post-patching persistence and enabling threat actors to re-access compromised devices without re-exploiting vulnerabilities," the agencies said.

In the investigated incident, the threat actors have been found to deploy a post-exploitation toolkit called LINE VIPER that can execute CLI commands, perform packet captures, bypass VPN Authentication, Authorization, and Accounting (AAA) for actor devices, suppress syslog messages, harvest user CLI commands, and force a delayed reboot.

The elevated access afforded by LINE VIPER served as a conduit for FIRESTARTER, which was deployed on the Firepower device before September 25, 2025, allowing the threat actors to maintain continued access and return to the compromised appliance as recently as last month.

A Linux ELF binary, FIRESTARTER can set up persistence on the device, and survive firmware updates and device reboots unless a hard power cycle occurs. The malware lodges itself into the device's boot sequence by manipulating a startup mount list, ensuring it automatically reactivates every time the device reboots normally. The resilience aside, it also shares some level of overlap with a previously documented bootkit referred to as RayInitiator.

"FIRESTARTER attempts to install a hook – a way to intercept and modify normal operations – within LINA, the device’s core engine for network processing and security functions," according to the advisory. "This hook enables the execution of arbitrary shell code provided by the APT actors, including the deployment of LINE VIPER."

"Although Cisco's patches addressed CVE-2025-20333 and CVE-2025-20362, devices compromised prior to patching may remain vulnerable because FIRESTARTER is not removed by firmware updates."

Cisco, which is tracking the exploitation activity associated with the two vulnerabilities under the moniker UAT4356 (aka Storm-1849), described FIRESTARTER as a backdoor that facilitates the execution of arbitrary shellcode received by the LINA process by parsing specially crafted WebVPN authentication requests containing a "magic packet."

The exact origins of the threat activity are not known, although an analysis from attack surface management platform Censys in May 2024 suggested links to China. UAT4356 was first attributed to a campaign called ArcaneDoor that exploited two zero-day flaws in Cisco networking gear to deliver bespoke malware capable of capturing network traffic and reconnaissance.

"To fully remove the persistence mechanism, Cisco strongly recommends reimaging and upgrading the device," Cisco said. "In cases of confirmed compromise on any Cisco Secure ASA or FTD platforms, all configuration elements of the device should be considered untrusted."

As mitigations until reimaging can be performed, the company is recommending that customers perform a cold restart to remove the FIRESTARTER implant. "The shutdown, reboot, and reload CLI commands will not clear the malicious persistent implant, the power cord must be pulled out and plugged back in the device," it added.

Chinese Hackers Shift From Individually Procured Infrastructure to Covert Networks

The disclosure comes as the U.S., the U.K., and various international partners released a joint advisory about large-scale networks of compromised SOHO routers and IoT devices commandeered by China-nexus threat actors to disguise their espionage attacks and complicate attribution efforts.

State-sponsored groups like Volt Typhoon and Flax Typhoon have been using these botnets, consisting of home routers, security cameras, video recorders, and other IoT devices, to target critical infrastructure sectors and conduct cyber espionage in a "low-cost, low-risk, deniable way," per the alert. 

Complicating matters further is the fact that the networks are constantly updated, not to mention multiple China-affiliated threat groups might use the same botnet at the same time, making it challenging for defenders to identify and block them using static IP blocklists.

"Covert networks mostly consist of compromised SOHO routers, but they also pull in any vulnerable device they can exploit at scale," the agencies said. "Their traffic will be forwarded through multiple compromised devices, used as traversal nodes, before exiting the network from an exit node, usually in the same geographic region as the target."

The findings underscore a common pattern seen in state-sponsored attacks: the targeting of network perimeter devices belonging to residential, enterprise, and government networks with an aim to either turn them into a proxy node or intercept sensitive data and communications.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/firestarter-backdoor-hit-federal-cisco.html
如有侵权请联系:admin#unsafe.sh