Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in 'Zero Disco' Attacks
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple
AI Analysis
Technical Summary
Operation Zero Disco is a sophisticated cyberattack campaign leveraging a recently disclosed stack overflow vulnerability (CVE-2025-20352) in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software. This vulnerability allows an authenticated remote attacker to execute arbitrary code by sending specially crafted SNMP packets to vulnerable devices. The campaign primarily targets legacy Cisco switch models including the 9400, 9300, and 3750G series, which run older Linux-based IOS versions lacking modern endpoint detection and mitigation features. Once exploited, attackers deploy Linux rootkits that implant hooks directly into the IOS daemon (IOSd) memory space, enabling persistent remote code execution and unauthorized access. The rootkit sets a universal password containing the string "disco" (a play on "Cisco") by modifying IOSd memory, bypasses AAA authentication, disables logging, conceals configuration changes by altering timestamps, and hides itself by using fileless techniques that vanish after reboot. Additionally, attackers have attempted to exploit a modified Telnet vulnerability derived from CVE-2017-3881 to gain arbitrary memory read/write capabilities, although the full extent of this functionality remains unclear. The rootkit is controlled via a UDP listener component that can operate on any port, further complicating detection. Newer Cisco devices with Address Space Layout Randomization (ASLR) provide some defense, but repeated exploitation attempts can still succeed. Cisco released a patch shortly after the vulnerability disclosure, but the zero-day exploitation window allowed attackers to compromise unpatched systems. The campaign uses spoofed IP and MAC addresses to obfuscate attacker origin. No specific threat actor attribution has been made. The attack's stealth, persistence, and targeting of critical network infrastructure pose significant risks to organizations relying on affected Cisco hardware.
Potential Impact
For European organizations, the impact of Operation Zero Disco can be severe, especially for enterprises, service providers, and government agencies relying on legacy Cisco network infrastructure. Compromise of core switches can lead to unauthorized persistent access, enabling attackers to intercept, manipulate, or disrupt network traffic, potentially affecting confidentiality, integrity, and availability of sensitive data and services. The rootkit's stealth capabilities make detection and incident response challenging, increasing dwell time and risk of lateral movement within networks. Disabling logs and hiding configuration changes impede forensic investigations. The universal password backdoor can allow attackers to maintain long-term control, bypassing standard authentication mechanisms. Organizations lacking endpoint detection and response (EDR) on network devices are particularly vulnerable. The exploitation of a Telnet-related memory vulnerability further expands the attack surface. Disruption or manipulation of critical network infrastructure could impact essential services, regulatory compliance, and business continuity. The campaign's targeting of older Cisco devices means organizations with delayed patch management or legacy hardware are at heightened risk.
Mitigation Recommendations
European organizations should immediately verify the Cisco IOS and IOS XE versions running on their network switches, focusing on 9400, 9300, and 3750G series devices. Apply Cisco's official patches for CVE-2025-20352 without delay. Where patching is not immediately feasible, implement network segmentation to isolate vulnerable devices and restrict SNMP access to trusted management hosts only. Disable SNMP if not required or limit it to read-only mode with strict access controls. Deploy network monitoring solutions capable of detecting anomalous SNMP traffic patterns and unusual UDP listener activity on switches. Enable and regularly review logging on network devices, and implement integrity monitoring to detect unauthorized configuration changes or timestamp alterations. Introduce endpoint detection and response (EDR) solutions tailored for network devices where possible. Conduct thorough audits for the presence of the rootkit indicators, including unusual universal passwords and hidden processes in IOSd memory. Restrict Telnet access and disable legacy protocols in favor of secure alternatives like SSH. Employ strong authentication mechanisms and multi-factor authentication for network device management. Regularly update asset inventories and retire unsupported legacy hardware. Finally, conduct incident response exercises simulating rootkit infections to prepare teams for detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Switzerland
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in 'Zero Disco' Attacks
Description
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple
AI-Powered Analysis
Technical Analysis
Operation Zero Disco is a sophisticated cyberattack campaign leveraging a recently disclosed stack overflow vulnerability (CVE-2025-20352) in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software. This vulnerability allows an authenticated remote attacker to execute arbitrary code by sending specially crafted SNMP packets to vulnerable devices. The campaign primarily targets legacy Cisco switch models including the 9400, 9300, and 3750G series, which run older Linux-based IOS versions lacking modern endpoint detection and mitigation features. Once exploited, attackers deploy Linux rootkits that implant hooks directly into the IOS daemon (IOSd) memory space, enabling persistent remote code execution and unauthorized access. The rootkit sets a universal password containing the string "disco" (a play on "Cisco") by modifying IOSd memory, bypasses AAA authentication, disables logging, conceals configuration changes by altering timestamps, and hides itself by using fileless techniques that vanish after reboot. Additionally, attackers have attempted to exploit a modified Telnet vulnerability derived from CVE-2017-3881 to gain arbitrary memory read/write capabilities, although the full extent of this functionality remains unclear. The rootkit is controlled via a UDP listener component that can operate on any port, further complicating detection. Newer Cisco devices with Address Space Layout Randomization (ASLR) provide some defense, but repeated exploitation attempts can still succeed. Cisco released a patch shortly after the vulnerability disclosure, but the zero-day exploitation window allowed attackers to compromise unpatched systems. The campaign uses spoofed IP and MAC addresses to obfuscate attacker origin. No specific threat actor attribution has been made. The attack's stealth, persistence, and targeting of critical network infrastructure pose significant risks to organizations relying on affected Cisco hardware.
Potential Impact
For European organizations, the impact of Operation Zero Disco can be severe, especially for enterprises, service providers, and government agencies relying on legacy Cisco network infrastructure. Compromise of core switches can lead to unauthorized persistent access, enabling attackers to intercept, manipulate, or disrupt network traffic, potentially affecting confidentiality, integrity, and availability of sensitive data and services. The rootkit's stealth capabilities make detection and incident response challenging, increasing dwell time and risk of lateral movement within networks. Disabling logs and hiding configuration changes impede forensic investigations. The universal password backdoor can allow attackers to maintain long-term control, bypassing standard authentication mechanisms. Organizations lacking endpoint detection and response (EDR) on network devices are particularly vulnerable. The exploitation of a Telnet-related memory vulnerability further expands the attack surface. Disruption or manipulation of critical network infrastructure could impact essential services, regulatory compliance, and business continuity. The campaign's targeting of older Cisco devices means organizations with delayed patch management or legacy hardware are at heightened risk.
Mitigation Recommendations
European organizations should immediately verify the Cisco IOS and IOS XE versions running on their network switches, focusing on 9400, 9300, and 3750G series devices. Apply Cisco's official patches for CVE-2025-20352 without delay. Where patching is not immediately feasible, implement network segmentation to isolate vulnerable devices and restrict SNMP access to trusted management hosts only. Disable SNMP if not required or limit it to read-only mode with strict access controls. Deploy network monitoring solutions capable of detecting anomalous SNMP traffic patterns and unusual UDP listener activity on switches. Enable and regularly review logging on network devices, and implement integrity monitoring to detect unauthorized configuration changes or timestamp alterations. Introduce endpoint detection and response (EDR) solutions tailored for network devices where possible. Conduct thorough audits for the presence of the rootkit indicators, including unusual universal passwords and hidden processes in IOSd memory. Restrict Telnet access and disable legacy protocols in favor of secure alternatives like SSH. Employ strong authentication mechanisms and multi-factor authentication for network device management. Regularly update asset inventories and retire unsupported legacy hardware. Finally, conduct incident response exercises simulating rootkit infections to prepare teams for detection and remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/hackers-deploy-linux-rootkits-via-cisco.html","fetched":true,"fetchedAt":"2025-10-17T05:34:22.269Z","wordCount":1009}
Threat ID: 68f1d5609c34d0947ff9969a
Added to database: 10/17/2025, 5:34:24 AM
Last enriched: 10/17/2025, 5:35:32 AM
Last updated: 10/20/2025, 8:45:01 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Vulnerabilities Allow Disruption of Phoenix Contact UPS Devices
LowGladinet Patches Exploited CentreStack Vulnerability
LowLinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
MediumPixnapping Attack Lets Attackers Steal 2FA on Android
LowOracle Patches EBS Vulnerability Allowing Access to Sensitive Data
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.