- Cisco Patches CVE-2025-20352, a SNMP error with high difficulty
- Attackers can cause dos or get rod access using designed SNMP packages and credentials
- There is no solution; Users need to apply Cisco’s patch or use temporary mitigation steps
Cisco has patched a vulnerability with high difficulty in its iOS and iOS XE software, as it says, is actively utilized in nature.
In a recently published security counseling, the company said it discovered and fixed a stack overflow mode in Simple Network Management Protocol (SNMP) Undersy system in us. It is tracked as CVE-2025-20352 and has a severity of 7.7/10 (high).
By utilizing the error, I could give low privileged attackers the possibility of reloading the systems and causing a DOS mode. A high privileged striker, on the other hand, could use the error to run arbitrary code as the root user and fully take over the compromised final points.
Patches and mitigations
To cause the dos, the striker must have SNMPV2C or previously read-protected community string or valid SNMPV3 user information, the network giant explained.
To perform code as a root user, the striker must have SNMPV1 or V2C writing protected community string or valid SNMPV3 user information and administrative or privilege 15-credentials on the affected device. The error could be utilized through a custom SNMP package sent over IPV4 or IPV6.
All devices running a vulnerable release of iOS and iOS XE are affected, emphasized the company, adding that all older versions of SNMP were deficient. This includes Meraki MS390 and Cisco Catalyst 9300 series Switches, which also runs Meraki CS 17.
To tackle the vulnerability, Cisco released a patch and warned users to use it immediately as the error is actively abused in nature: “Cisco Product Security Incident Response Team (PSIRT) became aware of a successful exploitation of this vulnerability in nature after local administrator’s credentials were compromised,” the company said. “
There are no solutions to tackle the error, but there is a remedy that can be used as a temporary solution until the patch is inserted. More details about the madness can be found at this link.
Via Bleeping computer



