← Back to news

UAT-4356's Targeting of Cisco Firepower Devices

Cisco Talos Intelligence23/04/2026, 15:10
Read full article →

Summary

AI-Generated

Key Points:

  • UAT-4356 is actively targeting Cisco Firepower devices by exploiting n-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) to deploy a backdoor named "FIRESTARTER."
  • The backdoor allows remote access and control over compromised devices, impacting Cisco's ASA and FTD appliances running FXOS.
  • Organizations are advised to follow Cisco's Security Advisory for mitigation steps, including reimaging affected devices and applying software upgrades.

Technical Details: FIRESTARTER manipulates the CSP_MOUNT_LIST to establish persistence and executes arbitrary shellcode via memory manipulation within the LINA process. The malware specifically targets XML-based WebVPN requests for payload execution.

MITRE ATT&CK Techniques:

  • T1203 - Exploit Public-Facing Application (Initial Access)
  • T1055.001 - Process Injection: Dynamic Link Library Injection (Execution)
  • T1543.003 - Create or Modify System Process: Windows Service (Persistence)

IOCs Mentioned:

  • CVE-2025-20333
  • CVE-2025-20362
  • Filenames: /usr/bin/lina_cs, /opt/cisco/platform/logs/var/log/svc_samcore.log

Join the discussion — sign up to comment, upvote, and save articles.

Discussion

or to comment
Loading...

Loading comments...

Join 5,000+ security professionals

Get access to curated threat intel, upvote articles, join discussions, and build your karma in the SOC community.