Site icon TheCyberThrone

Operation Zero Disco: Cisco SNMP Vulnerability Exploited

Advertisements

A new and highly sophisticated cyberattack campaign, dubbed Operation Zero Disco by Trend Micro researchers, is actively exploiting a critical vulnerability in Cisco network devices to install stealthy Linux rootkits. The attack targets unprotected Cisco switches running older Linux-based IOS and IOS XE software, affecting Cisco 9400, 9300, and legacy 3750G series devices.

About the Vulnerability and Attack

The core vulnerability exploited is CVE-2025-20352, a stack overflow flaw in the Simple Network Management Protocol (SNMP) subsystem of Cisco devices. It allows authenticated remote attackers to execute arbitrary code by sending specially crafted SNMP packets. Alongside this, attackers have been observed leveraging a modified Telnet vulnerability (related to CVE-2017-3881) to enable memory read/write access on targeted devices.

Once exploited, attackers gain remote code execution (RCE) capabilities and implant sophisticated Linux rootkits. These rootkits operate largely filelessly by hooking into the Cisco IOS daemon (IOSd) memory, enabling persistent and stealthy control of the infected switches. They set a universal password containing the string “disco” (a subtle alteration of “Cisco”), allowing unauthorized access through multiple authentication methods.

Attack Methodology and Impact

The operation predominantly affects older switches without endpoint detection and response (EDR) solutions, making detection difficult for defenders. The advanced techniques afford attackers persistent, nearly invisible backdoors into critical network infrastructure.

Indicators of Compromise (IoCs)

Detection and Mitigation Recommendations

Detecting a Zero Disco compromise requires deep forensic analysis, often necessitating vendor support for low-level firmware inspections. Organizations should:

Operation Zero Disco represents a significant threat to enterprise network infrastructure relying on vulnerable Cisco hardware. Proactive monitoring, rapid patching, and comprehensive security controls are essential to prevent these stealthy rootkits from compromising critical network operations.

This incident underscores the persistent risks posed by unpatched vulnerabilities in core networking hardware and the evolving sophistication of attackers leveraging zero-day exploits to establish hard-to-detect footholds in critical IT environments.

Exit mobile version