Illustration of a cyber attack on Cisco devices, showing analysts monitoring screens with code and warnings in a dark operations room.
Illustration of a cyber attack on Cisco devices, showing analysts monitoring screens with code and warnings in a dark operations room.
AI द्वारा उत्पन्न छवि

Operation Zero Disco exploits Cisco SNMP flaw for rootkits

AI द्वारा उत्पन्न छवि

Cyber threat actors in Operation Zero Disco have exploited a vulnerability in Cisco's SNMP service to install persistent Linux rootkits on network devices. The campaign targets older Cisco switches and uses crafted packets to achieve remote code execution. Trend Micro researchers disclosed the attacks on October 16, 2025, highlighting risks to unpatched systems.

Trend Micro researchers have uncovered Operation Zero Disco, a cyber campaign exploiting CVE-2025-20352, a stack overflow vulnerability in the SNMP subsystem of Cisco IOS and IOS XE Software. Rated at CVSS 7.7, the flaw allows remote authenticated attackers to trigger denial-of-service conditions with low privileges or achieve root code execution with high privileges by sending crafted SNMP packets over IPv4 or IPv6 networks. The vulnerability affects all devices with SNMP enabled, and Cisco's Product Security Incident Response Team confirmed attacks in the wild.

The operation primarily targets older Cisco models, including the 9400, 9300 series, and legacy 3750G switches running outdated Linux distributions without endpoint detection and response tools. Attackers combined the SNMP exploit with a modified version of the Telnet vulnerability CVE-2017-3881 to enable arbitrary memory read and write access. Once inside, they deploy fileless rootkits that hook into the IOSd daemon on the Linux kernel, installing a universal password containing the word 'disco'—a one-letter alteration from 'Cisco.' These rootkits create a UDP listener on any port for remote commands, hide configuration items like account names, EEM scripts, and ACLs from the running config, bypass VTY ACLs, toggle or delete logs, and reset timestamps to conceal changes. Components operate in memory and disappear after reboot, aiding persistence and evasion.

To move laterally, attackers target core switches in segmented networks protected by firewalls. They abuse default public SNMP communities for initial access, add routing rules to reach other VLANs, and use ARP spoofing and IP impersonation to bypass internal firewalls by disabling logs, assigning waystation IPs to ports, and forcing the real device offline. Newer switch models benefit from Address Space Layout Randomization, reducing intrusion success, though repeated attempts can overcome it. Cisco has issued patches, but attacks predated their release. Trend Micro recovered exploits for 32- and 64-bit platforms and published indicators of compromise. For suspected compromises, experts recommend contacting Cisco TAC for firmware analysis and applying detection rules from Trend Micro.

संबंधित लेख

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI द्वारा उत्पन्न छवि

Researchers discover SSHStalker botnet infecting Linux servers

AI द्वारा रिपोर्ट किया गया AI द्वारा उत्पन्न छवि

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Researchers have unveiled AirSnitch, a series of attacks that undermine client isolation in Wi-Fi networks, allowing unauthorized communication between devices. The technique exploits low-level network behaviors and affects routers from major manufacturers including Netgear, D-Link, and Cisco. Presented at the 2026 Network and Distributed System Security Symposium, the findings highlight vulnerabilities in home, office, and enterprise setups.

AI द्वारा रिपोर्ट किया गया

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

The U.S. Department of the Treasury has sanctioned a Russian exploit brokerage network accused of buying stolen U.S. government cyber tools with cryptocurrency and reselling them. This marks the first use of authorities under the Protecting American Intellectual Property Act. The network, led by Sergey Sergeyevich Zelenyuk, obtained at least eight proprietary tools from a U.S. defense contractor.

AI द्वारा रिपोर्ट किया गया

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

यह वेबसाइट कुकीज़ का उपयोग करती है

हम अपनी साइट को बेहतर बनाने के लिए विश्लेषण के लिए कुकीज़ का उपयोग करते हैं। अधिक जानकारी के लिए हमारी गोपनीयता नीति पढ़ें।
अस्वीकार करें