Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild

Posted on September 24, 2025September 24, 2025 By CWS

Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its broadly used IOS and IOS XE software program, confirming it’s being actively exploited within the wild.

The flaw exists within the Easy Community Administration Protocol (SNMP) subsystem and might permit a distant attacker to attain distant code execution (RCE) or trigger a denial-of-service (DoS) situation on weak gadgets.

The vulnerability was first recognized in the course of the investigation of a Cisco Technical Help Middle (TAC) assist case.

The vulnerability is rooted in a stack overflow situation (CWE-121) throughout the SNMP subsystem of each Cisco IOS and IOS XE software program. An attacker can set off this flaw by sending a crafted SNMP packet over an IPv4 or IPv6 community to an affected gadget.

The advisory, printed on September 24, 2025, confirms that each one variations of SNMP (v1, v2c, and v3) are vulnerable.

The severity of the exploit is determined by the attacker’s privilege stage:

A low-privileged however authenticated distant attacker may cause the affected gadget to reload, resulting in a DoS situation. This requires entry to an SNMPv2c read-only neighborhood string or legitimate SNMPv3 person credentials.

A high-privileged attacker with administrative or privilege 15 credentials can execute arbitrary code as the basis person on gadgets working IOS XE, successfully gaining full management of the system.

Energetic Exploitation and Affected Gadgets

Cisco’s Product Safety Incident Response Staff (PSIRT) has confirmed profitable exploitation of this vulnerability within the wild.

In response to the advisory, the attackers leveraged the flaw after first compromising native administrator credentials, demonstrating a chained assault methodology.

This highlights the essential want for sturdy credential administration alongside patching.

The vulnerability impacts a broad vary of Cisco gadgets working weak releases of IOS and IOS XE software program the place SNMP is enabled. Particular merchandise talked about embody the Meraki MS390 and Cisco Catalyst 9300 Sequence Switches.

ProductAffected VersionsFixed ReleaseCisco IOS & IOS XE SoftwareAll releases with SNMP enabled previous to the primary fastened software program launch are thought-about weak.Clients ought to use the Cisco Software program Checker to find out the suitable patched launch for his or her particular software program prepare.Meraki MS390 SwitchesMeraki CS 17 and earlier.The vulnerability is addressed in Cisco IOS XE Software program Launch 17.15.4a.Cisco Catalyst 9300 Sequence SwitchesMeraki CS 17 and earlier.The vulnerability is addressed in Cisco IOS XE Software program Launch 17.15.4a.

Any gadget with SNMP enabled is taken into account weak until particular configurations are in place to dam the malicious visitors. Directors can use present running-config instructions to find out if SNMP is energetic on their methods.

Cisco has launched software program updates to repair this vulnerability and strongly recommends that each one clients improve to a patched software program launch to totally remediate the problem. The advisory, recognized as cisco-sa-snmp-x4LPhte, clarifies that there aren’t any workarounds accessible.

For organizations that can’t instantly apply the updates, Cisco has supplied a mitigation approach. Directors can configure an SNMP view to exclude the affected object IDs (OIDs), stopping the weak code path from being triggered.

Nevertheless, Cisco cautions that this mitigation might disrupt community administration functionalities, akin to gadget discovery and {hardware} stock monitoring. As a basic safety measure, Cisco additionally advises limiting SNMP entry to solely trusted customers.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Actively, Cisco, Exploited, IOS, RCE, Vulnerability, Wild

Post navigation

Previous Post: Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike
Next Post: How to Detect Hidden Redirects and Payloads

Related Posts

Google Announces 10 New AI Features for Google Chrome Powered by Gemini Cyber Security News
ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger Cyber Security News
Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code Cyber Security News
New Malware Attack Via “I’m not a Robot Check” to Trick Users into Running Malware Cyber Security News
Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode Cyber Security News
Authorities Arrested Hackers With Specialized FLIPPER Hacking Equipment Used to Attack IT Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark