Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Rootkit Campaign Exploits Cisco SNMP Flaw to Gain Persistence
News

New Rootkit Campaign Exploits Cisco SNMP Flaw to Gain Persistence

Team-CWDBy Team-CWDOctober 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A campaign that exploited a Cisco Simple Network Management Protocol vulnerability to install Linux rootkits on exposed network devices has been observed.

The exploit, tracked as CVE-2025-20352 and detailed in a new analysis by Trend Micro, allowed remote code execution and persistent, unauthorized access by embedding hooks into IOSd memory and creating a universal password based around the word “disco.”

Exploit Mechanics and Control

Attackers combined the SNMP exploit with a modified Telnet flaw based on CVE-2017-3881 to read and write memory, and then used a UDP controller on infected switches to toggle logs bypass authentication and conceal configuration changes.

Trend Micro said the operation targeted older Linux hosts lacking endpoint detection response, where fileless components could disappear after reboot, yet still enable lateral movement.

Trend Research recovered multiple exploit variants for 32-bit and 64-bit platforms and found the operation impacted Cisco 9400 series, 9300 series and legacy 3750G devices. Cisco provided forensic support that helped confirm affected models and assisted the investigation. 

Attacks against 32-bit builds included an SNMP exploit that split command payloads across packets and a Telnet variant used to permit arbitrary memory access.

For 64-bit targets attackers needed guest shell access at level 15 to install a fileless backdoor and to use a UDP controller to perform management functions remotely.

Read more on Cisco SNMP vulnerabilities: Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw 

Rootkit Capabilities and Detection

The rootkit granted several covert capabilities, including:

  • Acting as a UDP listener on any port for remote commands

  • Creating a universal password by modifying IOSd memory

  • Hiding running-config items such as account names EEM scripts and ACLs

  • Bypassing VTY ACLs and resetting the last running-config write timestamp

  • Toggling or deleting device logs

Currently, there is no universal automated test to confirm compromise by this operation. If compromise is suspected, device owners are advised to contact Cisco TAC for a low-level firmware and ROM investigation, and to apply vendor guidance and detection rules supplied by Trend Micro.

To prevent compromise, device owners should promptly install Cisco patches and firmware updates, remove or harden default SNMP community strings or disable SNMP when not required, and restrict management access to bastion hosts and dedicated admin networks.

They should also disable Telnet and guest shell or tightly control level 15 access, deploy endpoint detection on Linux hosts, implement strong ACLs and network segmentation, enable ASLR-capable hardware where available, and adopt the detection rules and hunting queries provided by Trend Micro.

Image credit: PJ McDonnell / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
Next Article F5 Reveals Nation State Breach and Urges Immediate Patching
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How to help older family members avoid scams

October 31, 2025

What parents should know to protect their children from doxxing

November 28, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.