As Many as 2m Cisco Devices Affected by Actively Exploited 0-Day
Posted3 months agoActive3 months ago
arstechnica.comTechstory
calmnegative
Debate
40/100
CiscoSnmpNetwork SecurityZero-Day Vulnerability
Key topics
Cisco
Snmp
Network Security
Zero-Day Vulnerability
A recently discovered 0-day vulnerability in Cisco devices has put approximately 2 million devices at risk, sparking concerns about SNMP security and the need for zero-trust networking.
Snapshot generated from the HN discussion
Discussion Activity
Very active discussionFirst comment
6m
Peak period
44
0-12h
Avg / period
12
Comment distribution48 data points
Loading chart...
Based on 48 loaded comments
Key moments
- 01Story posted
Sep 25, 2025 at 9:22 AM EDT
3 months ago
Step 01 - 02First comment
Sep 25, 2025 at 9:28 AM EDT
6m after posting
Step 02 - 03Peak activity
44 comments in 0-12h
Hottest window of the conversation
Step 03 - 04Latest activity
Sep 29, 2025 at 4:29 PM EDT
3 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45372361Type: storyLast synced: 11/20/2025, 3:22:58 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
It became clear to me over time that the pattern at that company was to direct the less great engineering resources to SNMP...
Anyways, Cisco hasn’t done great engineering pretty much since the dotcom bust. They’re now essentially a giant PE firm that grows through acquisitions and then milks them dry. It’s a classic case of the accountants took over.
That was by far the most egregious example I’ve encountered of “we are trying to get unpaid labor from our interview process.”
I was at a startup they acquired ~4 years ago, by now it's just about milked completely dry.
Even though our product is close to industry-leading, they laid off our product manager, then another one, the QA team, and half of the devs. Unsurprisingly the product is falling apart.
It's not a company that attempts to produce value, as with so many others the product is the stock price.
The MBAs are showing some kind of savings on a spreadsheet somewhere though, so I suppose all the sacrifices are worth it.
EDIT: it seems like it was an acquihire of Dybvig and the team working on chez for something under NDA.
Network infrastructure security has a lot of unsolved gotchas and not a lot of industry desire to fix. Most of what everyone interacts with is in an abstracted or virtualized layer on top of the old plumbing.
You can take a look at an implementation of that, which I had built for entertainment: https://github.com/ayourtch/oside/blob/main/examples/snmpwal...
If I remember right, handling SNMPv3 traps required some messy key stuff so the agent still sent SNMPv2 traps, but there was no requirement for keys for GET/SET.
How did the attacker get the community string?
Bonus: if the "private" community is exposed on Cisco IOS, you can read and write the router's configuration.
For smaller operations I think just disabling SNMP is safer due to constant bugs and issues.
On the other hand bigger operations, you gotta monitor your devices. But now you’re open to the can of worms.
Depends what you mean by "expose". Some people could read that as "exposed to the Internet". I'm reading it as "exposed to anything".
This looks like a good fun for doing lateral movement inside a network. I know of lots of environments with SNMPv2 wide open for "internal" networks to access.
Plus SNMP is UDP-based, so likely the exploit will work with a one-way path and spoofed source addresses.
Daydream: Journalists start ending such articles with "This is the Nth critical security flaw for Cisco in just the past year. Network security professionals we spoke to agree that network equipment vendors X, Y, and Z all have far better track records than Cisco."
How 'bout if Consumer Reports published a "We Tested 17 kitchen garbage disposals" article, and their 1-paragraph summary of the worst-rated model said "buy one of our 3 top-rated models instead"?
(Yes, I know you're giving a "proper" response. And that very few journalists might say "buy X, Y, or Z instead" about a 900 lbs. gorilla like Cisco. Recall my "Daydream" disclaimer.)
I guess that makes it a hononym of a different acronym.
This is why zero trust networking makes sense. You can't assume the network layer is secure when the infrastructure itself is compromised.