CISA: Firestarter Backdoor Survives Cisco Patches on US Gov Firewalls

Share
Minimalist white line art of a firewall icon (a wall with a fire flame) with a white "power plug" icon disconnected, overlaid on a solid safety orange background.

Federal agency confirmed breached via unpatched Cisco ASA flaws; only a hard power cycle removes the persistent implant redeploying months after initial patches.

WASHINGTON, D.C. — The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent directive following the discovery of a Firestarter malware infection within a U.S. federal agency. The backdoor, part of the sophisticated "LineRunner" malware family, has demonstrated a terrifying capability: it survives standard firmware updates and software reboots on Cisco ASA and Firepower devices.

The breach underscores a significant evolution in the ArcaneDoor campaign, an operation attributed by Cisco Talos to the threat actor UAT-4356. Despite patches issued in September 2025, CISA warns that the implant can persist in a dormant state, redeploying its companion toolkit — Line Viper — as recently as March 2026.


Breach Audit: The Persistence Mechanism

The Firestarter malware targets core networking code, specifically injecting shellcode into LINA (Cisco’s core firewall process). The sophistication of the attack lies in its ability to manipulate the Cisco Service Platform mount list. When the system attempts to terminate or reboot, the malware copies itself to a secondary hidden location and rewrites the boot sequence to auto-restore upon startup.

Technical Analysis: Firestarter Persistence
Component Mechanism
LINA Injection Intercepts VPN authentication requests via a hidden "trigger" sequence to execute remote code.
Mount List Manipulation Rewrites the internal filesystem mount list to auto-restore the backdoor during the boot cycle.
Persistence Loop Survives firmware updates; requires a full hard power cycle (unplugging) to clear volatile memory.

Vulnerability Context: The ArcaneDoor Legacy

The initial access points for this campaign were two critical vulnerabilities patched in late 2025:

  • CVE-2025-20333: A Remote Code Execution (RCE) flaw in the VPN web server.
  • CVE-2025-20362: An unauthorized access vulnerability allowing attackers to bypass internal security controls.

CISA’s investigation into the federal agency breach revealed that while the agency had patched these flaws, the Firestarter implant had already been established. This mimics the supply chain compromise tactics used in other high-profile vendor breaches, where the vulnerability is merely the "door" and the persistent implant is the "resident."


The CyberSignal Analysis

Signal 01 — The Patching Paradox

Standard patching cycles assume that a clean firmware update replaces all malicious files. Firestarter proves this assumption wrong by modifying the low-level platform mount lists. This necessitates a shift in firewall security best practices — moving from "patch and reboot" to "patch, hard power cycle, and verify."

Signal 02 — Supply Chain Persistence

This campaign highlights the vulnerability of the network edge. When a vendor's primary security appliance becomes a persistent staging ground, the trust in the entire supply chain is compromised. Similar to the Citizens Financial vendor incident, the primary risk is no longer the data theft itself, but the long-term, unmonitored presence of state-sponsored actors like UAT-4356.


Sources

Type Source
Gov Directive CISA: Firestarter Alert & Mitigation
Breach Report SecurityWeek: US Agency Confirmed Breach
Talos Intel The Record: ArcaneDoor Campaign Tracking

Read more