Active Exploitation of Cisco IOS 0-Day RCE Vulnerability Reported

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Cisco Unveils Critical Zero-Day Vulnerability in IOS and IOS XE Software

Cisco has recently divulged a significant zero-day vulnerability, designated CVE-2025-20352, impacting its extensively utilized IOS and IOS XE software. Alarmingly, this flaw is reportedly being actively exploited in the field.

The vulnerability resides within the Simple Network Management Protocol (SNMP) subsystem, enabling a remote adversary to execute remote code execution (RCE) or instigate a denial-of-service (DoS) scenario on affected devices.

Discovery of this flaw transpired during an investigation by the Cisco Technical Assistance Center (TAC) into a support case.

The root of the vulnerability is a stack overflow condition (CWE-121) within the SNMP subsystem of both software platforms. An attacker can activate this flaw by transmitting a specially crafted SNMP packet over either an IPv4 or IPv6 network to the compromised device.

According to the advisory released on September 24, 2025, all variants of SNMP (v1, v2c, and v3) are vulnerable.

The severity of the exploit varies based on the attacker’s privilege level:

  • An authenticated remote attacker with low privileges can force the affected device to reload, resulting in a DoS condition. This necessitates access to an SNMPv2c read-only community string or valid SNMPv3 user credentials.
  • A highly privileged attacker, possessing administrative or privilege 15 credentials, can execute arbitrary code as the root user on IOS XE devices, thereby seizing full control of the system.

Current Exploitation Landscape and Vulnerable Devices

The Cisco Product Security Incident Response Team (PSIRT) has corroborated the successful exploitation of this vulnerability in real-world scenarios.

Notably, attackers have utilized this vulnerability after initially compromising local administrator credentials, underscoring a chained attack methodology.

This highlights the imperative for robust credential management alongside timely patching.

The vulnerability impacts a wide variety of Cisco devices operating on susceptible releases of IOS and IOS XE where SNMP is enabled. Specific models affected include the Meraki MS390 and the Cisco Catalyst 9300 Series Switches.

ProductAffected VersionsFixed Release
Cisco IOS & IOS XE SoftwareAll releases with SNMP enabled prior to the first fixed software release are deemed vulnerable.Customers are advised to utilize the Cisco Software Checker to ascertain the suitable patched release for their specific software train.
Meraki MS390 SwitchesMeraki CS 17 and prior versions.This vulnerability is rectified in Cisco IOS XE Software Release 17.15.4a.
Cisco Catalyst 9300 Series SwitchesMeraki CS 17 and earlier releases.Cisco IOS XE Software Release 17.15.4a addresses this vulnerability.

Devices with SNMP enabled are considered vulnerable unless specific configurations effectively obstruct malicious traffic. Administrators can employ the show running-config command to determine whether SNMP is active on their systems.

Cisco has released software updates to remediate this vulnerability and strongly advises all customers to upgrade to a fortified software release to mitigate the issue wholly. The advisory labelled cisco-sa-snmp-x4LPhte delineates that no workarounds are available.

For entities unable to enact updates immediately, Cisco has proposed a mitigation strategy, allowing administrators to configure an SNMP view that excludes the pertinent object IDs (OIDs), thus averting the triggering of the vulnerable code path.

Nevertheless, Cisco warns that this mitigation might disrupt essential network management functionalities, such as device discovery and hardware inventory monitoring. Additionally, it is prudent to restrict SNMP access strictly to trusted individuals as a general security precaution.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading