Flagging an important warning from the FBI / IC3, and sharing resources to help you assess and reduce risk. Alert Number: I-082025-PSA - Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure
Â
The High-Level
- The FBI is alerting that Russian FSB cyber actors (aka Center 16 / “Berserk Bear” / “Dragonfly”) are actively exploiting a known vulnerability in Cisco Smart Install (SMI) — CVE-2018-0171 — to target networking devices globally.
- These actors are using SNMP (especially older/insecure versions v1 and v2) and unpatched / end-of-life devices to:
- Collect configuration files.
- Modify configs to insert or enable unauthorized access.
- Do reconnaissance inside victim networks, with particular interest in protocols & applications used in critical infrastructure / industrial control systems.
- The vulnerability and use of legacy/unsecured protocols make aging equipment especially risky. Even if a device is not directly breached, weak practices may allow attackers in.
Â
How Forward Can Help Mitigate Risk
Forward features can help you detect, assess, and remediate exposure related to the concerns in this alert.
-  Device Inventory + Vulnerability Awareness Knowing what devices you have, their software/firmware versions, and whether they’re still supported lets you quickly map risk — which ones are vulnerable to CVE-2018-0171 or have SMI enabled.
Â
- End of Life / End of Sale (EoL/EoS) Checker -  Identifies devices in your network that are past their supported life — these are more likely to have unpatched vulnerabilities and be targeted. Helps enhanced monitoring and prioritize replacement.
Â
- Configuration Monitoring & Change Detection - Show if configs have been modified in unexpected ways (e.g. Smart Install settings, SNMP settings). Early detection is key — attackers modifying configs often precedes deeper compromise.
- Continuous Audits Regular Intent Checks to identify SNMP v1/v2, unpatched firmware versions — catching silent vulnerabilities before they’re exploited.
Â
Next Steps
- Check your Cisco devices to see if Smart Install is enabled. If yes, disable it if not needed; if needed, ensure it’s configured securely and access is restricted.
- Use Forward to inventory devices, check for EOL/EOS status, and continuously monitor for vulnerabilities.
- Update / patch firmware / software on any devices susceptible to CVE-2018-0171 or decommission devices no longer supported (i.e. EOL/EOS).
- Audit SNMP usage: ensure only SNMP v3 (with encryption/authentication) is used; disable v1 / v2 if possible.
- Continuously Monitor configurations for unexpected changes.
Â
Â
Please reach out if you have any questions or need assistance.Â