Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild

Posted on September 24, 2025September 24, 2025 By CWS

Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its broadly used IOS and IOS XE software program, confirming it’s being actively exploited within the wild.

The flaw exists within the Easy Community Administration Protocol (SNMP) subsystem and might permit a distant attacker to attain distant code execution (RCE) or trigger a denial-of-service (DoS) situation on weak gadgets.

The vulnerability was first recognized in the course of the investigation of a Cisco Technical Help Middle (TAC) assist case.

The vulnerability is rooted in a stack overflow situation (CWE-121) throughout the SNMP subsystem of each Cisco IOS and IOS XE software program. An attacker can set off this flaw by sending a crafted SNMP packet over an IPv4 or IPv6 community to an affected gadget.

The advisory, printed on September 24, 2025, confirms that each one variations of SNMP (v1, v2c, and v3) are vulnerable.

The severity of the exploit is determined by the attacker’s privilege stage:

A low-privileged however authenticated distant attacker may cause the affected gadget to reload, resulting in a DoS situation. This requires entry to an SNMPv2c read-only neighborhood string or legitimate SNMPv3 person credentials.

A high-privileged attacker with administrative or privilege 15 credentials can execute arbitrary code as the basis person on gadgets working IOS XE, successfully gaining full management of the system.

Energetic Exploitation and Affected Gadgets

Cisco’s Product Safety Incident Response Staff (PSIRT) has confirmed profitable exploitation of this vulnerability within the wild.

In response to the advisory, the attackers leveraged the flaw after first compromising native administrator credentials, demonstrating a chained assault methodology.

This highlights the essential want for sturdy credential administration alongside patching.

The vulnerability impacts a broad vary of Cisco gadgets working weak releases of IOS and IOS XE software program the place SNMP is enabled. Particular merchandise talked about embody the Meraki MS390 and Cisco Catalyst 9300 Sequence Switches.

ProductAffected VersionsFixed ReleaseCisco IOS & IOS XE SoftwareAll releases with SNMP enabled previous to the primary fastened software program launch are thought-about weak.Clients ought to use the Cisco Software program Checker to find out the suitable patched launch for his or her particular software program prepare.Meraki MS390 SwitchesMeraki CS 17 and earlier.The vulnerability is addressed in Cisco IOS XE Software program Launch 17.15.4a.Cisco Catalyst 9300 Sequence SwitchesMeraki CS 17 and earlier.The vulnerability is addressed in Cisco IOS XE Software program Launch 17.15.4a.

Any gadget with SNMP enabled is taken into account weak until particular configurations are in place to dam the malicious visitors. Directors can use present running-config instructions to find out if SNMP is energetic on their methods.

Cisco has launched software program updates to repair this vulnerability and strongly recommends that each one clients improve to a patched software program launch to totally remediate the problem. The advisory, recognized as cisco-sa-snmp-x4LPhte, clarifies that there aren’t any workarounds accessible.

For organizations that can’t instantly apply the updates, Cisco has supplied a mitigation approach. Directors can configure an SNMP view to exclude the affected object IDs (OIDs), stopping the weak code path from being triggered.

Nevertheless, Cisco cautions that this mitigation might disrupt community administration functionalities, akin to gadget discovery and {hardware} stock monitoring. As a basic safety measure, Cisco additionally advises limiting SNMP entry to solely trusted customers.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Actively, Cisco, Exploited, IOS, RCE, Vulnerability, Wild

Post navigation

Previous Post: Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike
Next Post: How to Detect Hidden Redirects and Payloads

Related Posts

10 Best AI penetration Testing Companies in 2025 Cyber Security News
New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads Cyber Security News
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
Dark Web Job Market Evolved Cyber Security News
New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic Cyber Security News
Hackers Actively Exploiting WordPress Arbitrary Installation Vulnerabilities in The Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark