Threat Advisory

Operation Zero Disco Campaign Exploits Cisco SNMP Vulnerability Deploying Linux Rootkits

Threat: Malicious Campaign
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High


EXECUTIVE SUMMARY:

A campaign exploits a Cisco SNMP vulnerability CVE‑2025‑20352 to gain remote code execution on vulnerable switches and implant persistent Linux rootkits that enable covert, long-term access, and attackers also leverage an older Telnet and cluster-management weakness CVE‑2017‑3881 where available to broaden access and persistence. The attackers focus on older or unprotected switch builds where endpoint detection is limited, leveraging these vulnerabilities to establish backdoors and conceal their activity.

The vulnerability can be exploited via crafted SNMP packets to achieve remote code execution on affected IOS IOS‑XE devices, and the operation has targeted older switch models including the 9400, 9300 and legacy 3750G series. Once exploited, attackers install a Linux rootkit that modifies IOSd memory, creates a universal backdoor password, and uses techniques that make components fileless or transient across reboots; the actors also employed spoofed network identifiers and attempted related Telnet‑based access methods. Technical indicators and the vendor advisory describe the specific SNMP attack vector, affected builds, and recommended immediate mitigations.

This operation demonstrates that legacy or unprotected network infrastructure can be turned into persistent footholds that resist routine detection and forensic review; organizations should treat affected switch platforms as high priority for mitigation. Immediate actions should include applying vendor advisories and firmware updates where available, restricting or disabling SNMP with default community strings, enforcing least-privilege access to guest and management shells, auditing configuration and logs for signs of the UDP controller or unexpected universal passwords, and performing forensic validation of switches for in-memory hooks or rootkit indicators. Enhanced network segmentation, blocking suspicious SNMP Telnet traffic, and deploying device host telemetry to detect anomalous behavior are recommended to reduce risk.

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial Access T1190 Exploit Public-Facing Application
Persistence T1547.006 Boot or Logon Autostart Execution Kernel Modules and Extensions
Privilege Escalation T1068 Exploitation for Privilege Escalation
Defense Evasion T1014 Rootkit
Credential Access T1556.004 Modify Authentication Process Network Device Authentication
Discovery T1046 Network Service Scanning
Collection T1602.001 Data from Configuration Repository SNMP

 

REFERENCES:

The following reports contain further technical details:

crossmenu