UAT-4356 FIRESTARTER Backdoor Targeting Cisco Firepower Devices
UAT-4356 is actively targeting Cisco Firepower devices running FXOS, exploiting CVE-2025-20333 and CVE-2025-20362 to deploy the FIRESTARTER backdoor which allows remote access and control by injecting malicious shellcode into the LINA process.
Cisco Talos reported that UAT-4356 continues to actively target Cisco Firepower devices running the Firepower eXtensible Operating System (FXOS). In early 2024, Cisco Talos attributed the ArcaneDoor campaign to UAT-4356, a state-sponsored actor focused on gaining access to network perimeter devices for espionage. The actor exploits n-day vulnerabilities CVE-2025-20333 and CVE-2025-20362 to gain unauthorized access to vulnerable devices. Upon successful exploitation, UAT-4356 deploys a custom-built backdoor called “FIRESTARTER,” which shares technical capabilities with RayInitiator’s Stage 3 shellcode. FIRESTARTER enables remote access and the execution of arbitrary code within the LINA process, a core component of Cisco’s ASA and FTD appliances. This allows the attackers to maintain persistent access to compromised systems.
Attack Chain
- UAT-4356 exploits CVE-2025-20333 and/or CVE-2025-20362 on Cisco Firepower devices running FXOS to gain initial access.
- The attacker manipulates the CSP_MOUNT_LIST to establish persistence for the FIRESTARTER backdoor.
- The FIRESTARTER backdoor is written to
/opt/cisco/platform/logs/var/log/svc_samcore.logand the CSP_MOUNT_LIST is updated to copy itself to/usr/bin/lina_cs. - After a graceful reboot, FIRESTARTER is executed from
/usr/bin/lina_cs. - FIRESTARTER restores the original CSP_MOUNT_LIST from
/tmp/CSP_MOUNTLIST.tmpand removes the temporary copy and the trojanized/usr/bin/lina_csfile from disk. - FIRESTARTER reads the LINA process’ memory, searching for specific byte sequences to verify memory layout.
- FIRESTARTER copies the next stage shellcode to the last 0x200 bytes of the “libstdc++.so” memory region.
- The attacker overwrites an internal data structure in the LINA process to replace a pointer to a legitimate WebVPN XML handler function with the address of the malicious shellcode. This allows execution of arbitrary shellcode received via WebVPN requests.
Impact
Compromised Cisco Firepower devices allow UAT-4356 to gain a foothold on network perimeters for espionage. Successful exploitation and deployment of the FIRESTARTER backdoor enable attackers to execute arbitrary shellcode, potentially leading to data exfiltration, further network compromise, or disruption of services. The number of victims is currently unknown, but this campaign targets network perimeter devices, which could impact organizations across various sectors.
Recommendation
- Deploy the file integrity monitoring rule to detect the creation or modification of
/usr/bin/lina_csand/opt/cisco/platform/logs/var/log/svc_samcore.log(see “File Creation in Suspicious Directory”). - Apply software upgrade recommendations outlined in Cisco’s Security Advisory to mitigate CVE-2025-20333 and CVE-2025-20362.
- Monitor network traffic for WebVPN requests containing unexpected XML payloads that might be used to trigger the FIRESTARTER backdoor.
Detection coverage 2
File Creation in Suspicious Directory
highDetects the creation of suspicious files often associated with the FIRESTARTER backdoor in directories commonly used by the malware.
LINA Process Execution
highDetects the execution of the lina_cs process, which may indicate the presence of the FIRESTARTER backdoor.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
2
filename
| Type | Value |
|---|---|
| filename | lina_cs |
| filename | svc_samcore.log |