Cisco

Cisco

Cisco disclosed a **high-severity zero-day vulnerability (CVE-2025-20352)** in its **IOS and IOS XE Software**, actively exploited in the wild. The flaw, a **stack-based buffer overflow** in the **SNMP subsystem**, allows **authenticated remote attackers with low privileges** to trigger **denial-of-service (DoS)** conditions on unpatched devices. High-privileged attackers can **execute arbitrary code as root**, gaining full system control. Exploitation occurs via **crafted SNMP packets** over IPv4/IPv6, with confirmed cases where **local administrator credentials were compromised**.The vulnerability affects **all devices with SNMP enabled**, with no workarounds except patching. Cisco urged immediate upgrades, though temporary mitigation includes **restricting SNMP access to trusted users**. The flaw was discovered after **real-world exploitation**, highlighting critical risks to network infrastructure. Additionally, Cisco patched **13 other vulnerabilities**, including two with public proof-of-concept exploits: a **reflected XSS (CVE-2025-20240)** enabling cookie theft and a **DoS flaw (CVE-2025-20149)** allowing device reloads by local attackers. Prior incidents, such as the **May 2025 IOS XE flaw** (hard-coded JWT exploitation), underscore recurring risks of **unauthenticated remote takeovers** in Cisco’s ecosystem.

Source: https://www.bleepingcomputer.com/news/security/cisco-warns-of-ios-zero-day-vulnerability-exploited-in-attacks/

TPRM report: https://www.rankiteo.com/company/cisco

"id": "cis2892128092425",
"linkid": "cisco",
"type": "Vulnerability",
"date": "5/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'Networking Hardware/Software',
                        'location': 'Global',
                        'name': 'Cisco Systems, Inc.',
                        'type': 'Corporation'}],
 'attack_vector': ['Network', 'SNMP Protocol (IPv4/IPv6)'],
 'customer_advisories': ['Urgent recommendation to apply patches or mitigate '
                         'SNMP access'],
 'description': 'Cisco has released security updates to address a '
                'high-severity zero-day vulnerability (CVE-2025-20352) in '
                'Cisco IOS and IOS XE Software, currently being exploited in '
                'attacks. The flaw is a stack-based buffer overflow in the '
                'SNMP subsystem, allowing authenticated remote attackers with '
                'low privileges to trigger DoS conditions or, if '
                'high-privileged, execute arbitrary code as root. Exploitation '
                'occurs via crafted SNMP packets over IPv4/IPv6. Cisco PSIRT '
                'confirmed in-the-wild exploitation after local Administrator '
                'credentials were compromised. Patches are available, but no '
                'workarounds exist beyond limiting SNMP access to trusted '
                'users as a temporary mitigation. Two additional '
                'vulnerabilities (CVE-2025-20240 and CVE-2025-20149) were also '
                'patched, with PoC exploit code available for the former.',
 'impact': {'operational_impact': ['Denial-of-Service (DoS) conditions',
                                   'Potential full system control by '
                                   'high-privileged attackers',
                                   'Cookie theft via XSS (CVE-2025-20240)'],
            'systems_affected': ['Cisco devices running vulnerable IOS/IOS XE '
                                 'Software with SNMP enabled']},
 'initial_access_broker': {'entry_point': ['Compromised local Administrator '
                                           'credentials']},
 'investigation_status': 'Ongoing (exploitation confirmed in the wild)',
 'post_incident_analysis': {'corrective_actions': ['Patch deployment '
                                                   '(CVE-2025-20352, others)',
                                                   'SNMP access restrictions'],
                            'root_causes': ['Stack-based buffer overflow in '
                                            'SNMP subsystem',
                                            'Insufficient input validation for '
                                            'SNMP packets']},
 'recommendations': ['Upgrade to fixed software releases immediately',
                     'Limit SNMP access to trusted users if patching is '
                     'delayed',
                     'Monitor for signs of exploitation (e.g., unexpected SNMP '
                     'traffic, DoS symptoms)',
                     'Review Administrator credential security '
                     'post-compromise'],
 'references': [{'source': 'Cisco PSIRT Advisory'}],
 'response': {'communication_strategy': ['Public advisory via Cisco PSIRT',
                                         'Recommendation for immediate '
                                         'patching'],
              'containment_measures': ['Limiting SNMP access to trusted users '
                                       '(temporary mitigation)'],
              'incident_response_plan_activated': True,
              'remediation_measures': ['Applying security patches for '
                                       'CVE-2025-20352, CVE-2025-20240, and '
                                       'CVE-2025-20149']},
 'stakeholder_advisories': ['Cisco PSIRT advisory with patching guidance'],
 'title': 'Cisco IOS and IOS XE Software Zero-Day Vulnerability '
          '(CVE-2025-20352) Exploited in Wild',
 'type': ['Zero-day Exploitation',
          'Buffer Overflow',
          'Denial-of-Service (DoS)',
          'Privilege Escalation',
          'Remote Code Execution (RCE)'],
 'vulnerability_exploited': [{'cve_id': 'CVE-2025-20352',
                              'description': 'Stack-based buffer overflow in '
                                             'SNMP subsystem of Cisco IOS/IOS '
                                             'XE Software',
                              'severity': 'High'},
                             {'cve_id': 'CVE-2025-20240',
                              'description': 'Reflected Cross-Site Scripting '
                                             '(XSS) in Cisco IOS XE'},
                             {'cve_id': 'CVE-2025-20149',
                              'description': 'Denial-of-Service (DoS) '
                                             'vulnerability in Cisco IOS XE '
                                             '(local attacker)'}]}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.