ZeroDisco Strikes: Unpatched Cisco Devices Fall Victim to Hilarious Rootkit Rave!

Older Cisco devices, unpatched against a zero-day vulnerability, are now starring in Operation ZeroDisco. This campaign transforms your hardware into a dance party for rootkits, thanks to a universal password featuring the word “disco.” Trend Micro reports that this security breach is no joke, but it sure comes with a catchy tune.

Pro Dashboard

Hot Take:

In an epic battle of Cisco vs. Disco, it seems the hackers are bringing the boogie to the network party with a rootkit in their back pocket. Just when you thought the ’70s were safely in the rearview mirror, Trend Micro reports that these cybercriminals are grooving their way through unpatched Cisco devices, dancing past defenses, and causing quite the ruckus. It’s like Saturday Night Fever, but for network admins – minus the iconic dance moves.

Key Points:

  • Cisco devices’ zero-day vulnerability, CVE-2025-20352, is being exploited in the wild.
  • The campaign, dubbed Operation ZeroDisco, uses a rootkit and a universal password with ‘disco’.
  • Older, vulnerable Cisco devices such as the 9400, 9300, and 3750G series are targeted.
  • The threat actors leverage SNMP and Telnet exploits for remote code execution and backdoor access.
  • There’s no universal tool to detect compromise; Cisco TAC assistance is recommended.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?