Skip to content
Briefings are running a touch slower this week while we rebuild the foundations.See roadmap
CF
ProductUS

Cisco Firepower Threat Defense

Cisco Firepower Threat Defense; next-generation firewall platform affected by the FIRESTARTER persistent implant alongside Cisco ASA.

Last refreshed: 20 May 2026 · Appears in 1 active topic

Key Question

After FIRESTARTER showed Cisco FTD can harbour hidden implants through patches, who has already been inside?

Timeline for Cisco Firepower Threat Defense

#224 Apr
View full timeline →
Common Questions
What is Cisco Firepower Threat Defense?
Cisco Firepower Threat Defense (FTD) is Cisco's next-generation firewall platform, combining stateful firewall and intrusion prevention capabilities with deep packet inspection. It is widely deployed in enterprise and government networks as the primary network-perimeter control.Source: Cisco
Was Cisco Firepower hacked in the FIRESTARTER campaign?
Yes. CISA and the UK NCSC documented in April 2026 that the FIRESTARTER persistent implant was deployed against Cisco Firepower Threat Defense and Cisco ASA appliances, with the implant surviving firmware and patch cycles. The attack was attributed to state-linked actors.Source: CISA / NCSC

Background

Cisco Firepower Threat Defense (FTD) is Cisco's next-generation firewall and intrusion prevention platform, combining Cisco ASA stateful firewall functionality with Snort-based deep packet inspection, threat intelligence integration, and application-layer visibility. FTD runs on both dedicated Firepower hardware appliances and Cisco ASA hardware via an FTD software image, and is widely deployed as the perimeter and internal segmentation control in enterprise, federal government, and critical infrastructure networks.

In prior reporting on this topic, Cisco FTD was documented alongside Cisco ASA as a target of the FIRESTARTER persistent implant campaign attributed to state-linked actors targeting network-edge appliances. FIRESTARTER demonstrated that Cisco FTD's firmware and software update mechanism could be subverted to maintain persistence through patch and firmware cycles, a capability that CISA and the UK NCSC documented in a joint advisory on 24 April 2026. The platform is also the broader product context for UAT-8616's Cisco SD-WAN exploitation cycle: both product families sit in the Cisco network-edge estate that state-actor clusters have been systematically targeting across 2026.

For defenders, Cisco FTD's relevance in the May 2026 window is primarily as prior context: the FIRESTARTER campaign established that Cisco edge appliances can harbour persistent implants, and UNC6780's theft of Cisco AI Defense source code raises an unanswered question about whether the exfiltrated material includes any FTD-adjacent components that could accelerate the next FTD-targeted exploit cycle.

Source Material