Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

Posted on September 25, 2025September 25, 2025 By CWS

Sep 25, 2025Ravie LakshmananVulnerability / Community Safety
Cisco has warned of a high-severity safety flaw in IOS Software program and IOS XE Software program that might permit a distant attacker to execute arbitrary code or set off a denial-of-service (DoS) situation beneath particular circumstances.
The corporate mentioned the vulnerability, CVE-2025-20352 (CVSS rating: 7.7), has been exploited within the wild, including it grew to become conscious of it “after native Administrator credentials have been compromised.”
The difficulty, per the networking tools main, is rooted within the Easy Community Administration Protocol (SNMP) subsystem, arising because of a stack overflow situation.
An authenticated, distant attacker might exploit the flaw by sending a crafted SNMP packet to an affected machine over IPv4 or IPv6 networks, leading to DoS if they’ve low privileges or arbitrary code execution as root if they’ve excessive privileges and in the end take management of the vulnerable system.

Nonetheless, Cisco famous that for this to occur, the next situations should be met –

To trigger the DoS, the attacker should have the SNMPv2c or earlier read-only neighborhood string or legitimate SNMPv3 person credentials
To execute code as the foundation person, the attacker should have the SNMPv1 or v2c read-only neighborhood string or legitimate SNMPv3 person credentials and administrative or privilege 15 credentials on the affected machine

The corporate mentioned the difficulty impacts all variations of SNMP, in addition to Meraki MS390 and Cisco Catalyst 9300 Collection Switches which are operating Meraki CS 17 and earlier. It has been mounted in Cisco IOS XE Software program Launch 17.15.4a. Cisco IOS XR Software program and NX-OS Software program usually are not impacted.
“This vulnerability impacts all variations of SNMP. All units which have SNMP enabled and haven’t explicitly excluded the affected object ID (OID) needs to be thought of susceptible,” Cisco mentioned.
Whereas there are not any workarounds that resolve CVE-2025-20352, one mitigation proposed by Cisco includes permitting solely trusted customers to have SNMP entry on an affected system, and monitoring the techniques by operating the “present snmp host” command.
“Directors can disable the affected OIDs on a tool,” it added. “Not all software program will assist the OID that’s listed within the mitigation. If the OID isn’t legitimate for particular software program, then it’s not affected by this vulnerability. Excluding these OIDs might have an effect on machine administration by SNMP, resembling discovery and {hardware} stock.”

The Hacker News Tags:Actively, Allowing, Cisco, DoS, Exploited, IOS, RCE, SNMP, Software, Vulnerability, Warns

Post navigation

Previous Post: Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information
Next Post: New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic

Related Posts

X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts The Hacker News
SaaS Breaches Start with Tokens SaaS Breaches Start with Tokens The Hacker News
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware The Hacker News
Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks The Hacker News
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt The Hacker News
CISOs Tackle Burnout and Reduce MTTR Without Extra Staff CISOs Tackle Burnout and Reduce MTTR Without Extra Staff The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark