CISCO - FIRESTARTER Backdoor (CVE-2025-20333) & (CVE-2025-20362).

Release Date: 23rd April 2026

Impact : HIGH / CRITICAL

TLP Rating: Clear

The Department of Communication and Digital Transformation (DCDT) through CERT Vanuatu (CERTVU), provides the following advisory.

This alert is relevant to Organizations and System/Network administrators that utilize the above products. This alert is intended to be understood by technical users and systems administrators.

What is it?

These advisory covers two critical vulnerabilities in Cisco's network security products — Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software — that have been actively exploited together by a sophisticated, state-sponsored Advanced Persistent Threat (APT) actor known as UAT-4356 (also tracked as ArcaneDoor and Storm-1849).

What makes this campaign exceptionally dangerous is a second stage: even after organisations patch the two CVEs, a custom-built backdoor called FIRESTARTER may already be embedded in the device. Patching alone does not remove it. The threat actor can continue to access the compromised device indefinitely unless specific additional steps are taken.

 

References

  1. https://www.cisa.gov/news-events/directives/v1-ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices
  2. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-CISAED25-03