Categories: Cyber Security News

CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks

Cisco’s Simple Network Management Protocol (SNMP) implementations in IOS and IOS XE have come under intense scrutiny following reports of active exploitation in the wild.

First disclosed in August 2025, CVE-2025-20352 describes a critical buffer overflow in the SNMP engine that allows unauthenticated remote attackers to execute arbitrary code.

The vulnerability arises when an oversized payload is sent in a GetBulk request, overrunning an internal buffer and redirecting control flow to attacker-supplied shellcode.

Initial indicators emerged when network operators began noticing unexplained device reboots and anomalous SNMP traffic patterns.

Subsequent forensic analysis revealed that compromised routers were pinging external command-and-control servers immediately after handling malformed SNMP requests.

CISA analysts identified this behavior within weeks of the vulnerability’s public disclosure, warning that adversaries are leveraging CVE-2025-20352 to establish persistent footholds in enterprise networks.

The impact spans a wide range of Cisco platforms, from ISR 4000 Series routers to Catalyst switches running IOS XE versions prior to 17.10.

Exploitation requires only network reachability to the SNMP service and no valid credentials, making exposed management interfaces particularly dangerous.

In one reported incident, attackers deployed a custom payload that established a reverse shell back to an attacker-controlled host, enabling full remote control of the device.

Infection Mechanism

Underneath the hood, the attack leverages a malformed PDU that triggers an out-of-bounds write in the SNMP engine’s stack.

Upon receiving a GetBulk request with a length field exceeding the maximum buffer size, the SNMP handler fails to validate the message size.

This overflow overwrites the saved return address on the stack, diverting execution to shellcode embedded in the packet.

Once execution begins, the payload initializes a socket connection back to the attacker’s IP address:-

from pysnmp.hlapi import *
payload = b"x90" * 100 + reverse_shell_shellcode
sendNotification(
    SnmpEngine(),
    CommunityData('public'),
    UdpTransportTarget(('192.0.2.123', 161)),
    ContextData(),
    NotificationType(
        ObjectIdentity('1.3.6.1.4.1.9.9.96'),
        ('1.3.6.1.4.1.9.9.96.1.1', OctetString(payload))
    )
)

The packet structure highlights how the oversized length field and embedded shellcode combine to hijack execution.

Network defenders are urged to apply the latest Cisco patches immediately and to restrict SNMP access to trusted hosts only.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Save 20% Off the Apple AirPods Pro 3, There’s Still Time to Have It Delivered by Mother’s Day

Mother's Day lands on May 10 this year. This time around, why not get mom…

48 minutes ago

Ravensburger Is Releasing New Star Wars Puzzles for The Mandalorian & Grogu Movie

Ravensburger is one of my overall favorite puzzle brands that just so happens to have…

48 minutes ago

Call of Duty 2026 Won’t Be Releasing on Last-Gen Consoles

Call of Duty fans can breathe a sigh of relief as this year's entry will…

48 minutes ago

Fallout Co-Creator Says Some Players Watch Influencers So They Can Be Told What to Think About Games

Fallout co-creator Tim Cain has shared his fear that some gamers are watching influencers just…

48 minutes ago

The Powerful AMD Radeon 9070 XT Graphics Card Drops to $680 for a Very Limited Time

Similar to every other high-end GPU on the market, the AMD Radeon 9070 XT graphics…

49 minutes ago

Take-Two CEO Explains Why GTA 6 Isn’t Coming to PC on Day One

Grand Theft Auto 6 won't be coming to PC when the game releases on November…

2 hours ago

This website uses cookies.