A previously undisclosed zero-day vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE software has been under active exploitation by threat actors. The vulnerability, now tracked as CVE-2025-20352, is a stack overflow flaw that can be leveraged for remote code execution (RCE). Security researchers at Trend Micro have linked the exploitation to a campaign they call "ZeroDisco," which targeted Cisco Catalyst 9400, 9300, and legacy 3750G series switches. The attackers successfully implanted sophisticated Linux rootkits on compromised devices, which were designed to be fileless and evade detection. Cisco has since released security updates and is strongly advising customers to apply them to all affected networking equipment.
The vulnerability affects a range of Cisco devices running vulnerable versions of IOS and IOS XE software. The "ZeroDisco" campaign specifically targeted the following switch series:
Cisco has provided a form in its security advisory and the Cisco Software Checker tool to help customers determine if their specific software version is affected. The attackers appeared to focus on older Linux systems that often lack modern endpoint detection and response (EDR) capabilities, making network devices an ideal target for stealthy persistence.
Cisco confirmed that CVE-2025-20352 was exploited as a zero-day before a patch was available. The "ZeroDisco" operation involved a multi-step attack chain:
T1070.001 - Indicator Removal: Clear Windows Event Logs), further hindering detection and investigation efforts.Detecting this compromise is challenging due to the attackers' anti-forensic techniques. However, organizations can take several steps:
Applying the security patches from Cisco is the most direct and effective way to remediate CVE-2025-20352.
Mapped D3FEND Techniques:
Restricting access to management interfaces like SNMP and Telnet to a dedicated, trusted network segment minimizes the attack surface.
Mapped D3FEND Techniques:
Since the exploit requires high-privilege credentials, enforcing strong, unique passwords and rotating them regularly makes the prerequisite harder for attackers to meet.
Mapped D3FEND Techniques:
The most urgent action for all organizations using Cisco IOS and IOS XE devices is to identify vulnerable systems and deploy the patches for CVE-2025-20352. Use the Cisco Software Checker tool to determine if your specific device models and software versions are affected. Prioritize patching for internet-facing devices and critical core network switches like the Catalyst 9300/9400 series. Since this was a zero-day under active exploitation, any unpatched, vulnerable device should be considered at high risk of compromise. After patching, verify the update was successful and that the device is no longer reported as vulnerable by scanning tools. This directly removes the vulnerability that the 'ZeroDisco' campaign relies on for initial code execution.
To mitigate the risk from CVE-2025-20352 and similar vulnerabilities, organizations must harden the configuration of their Cisco devices. Specifically for this threat, if SNMP is not essential for business operations on a particular device, it should be disabled entirely. If it is required, configure SNMPv3 with strong authentication and encryption. Crucially, implement strict SNMP Access Control Lists (ACLs) to ensure that only authorized and trusted management stations can send SNMP requests to the device. This configuration hardening acts as a vital compensating control, especially if patching cannot be immediately deployed, as it blocks the attack vector used to deliver the malicious SNMP packet.
Implement network traffic analysis focused on management protocols for critical network infrastructure. For the 'ZeroDisco' campaign, this involves baselining normal SNMP and Telnet traffic to and from your Cisco switches. Configure your NIDS or NDR solution to alert on anomalies, such as SNMP packets with unusual sizes or structures, Telnet connections from unauthorized subnets, or any communication patterns that deviate from the established norm. Since the rootkit is fileless and resides in memory, network-based detection is one of the most effective ways to spot post-compromise activity or further exploitation attempts. Monitoring traffic can help identify a compromised switch even if the attacker has cleared local device logs.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats