Active Exploitation of Zero-Day Vulnerability CVE-2025-20352 in Cisco IOS and IOS XE
Cisco has released a security advisory to address exploited vulnerability CVE-2025-20352 that could lead to remote code execution or a denial-of-service condition
Summary
Cisco has released a security advisory to address exploited vulnerability CVE-2025-20352 that could lead to remote code execution or a denial-of-service condition
Affected platforms
The following platforms are known to be affected:
Threat details
Exploitation of CVE-2025-20352
Cisco has reported exploitation of CVE-2025-20352 in the wild. The NHS England National CSOC assesses further exploitation is highly likely.
Introduction
Cisco has released a security advisory to address a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco's IOS and IOS XE platforms. Cisco IOS and IOS XE are the operating systems for Cisco networking appliances.
Vulnerability details
- CVE-2025-20352 is a "stack-based buffer overflow" vulnerability with a CVSSv3 score of 7.7. Successful exploitation could allow an authenticated, remote attacker to execute arbitrary code or cause a denial-of-service condition. To execute code remotely, an attacker must have either the SNMPv1 or SNMPv2c read-only community string; or valid SNMPv3 user credentials with administrative or privilege 15 permissions on the affected device. CVE-2025-20352 is under active exploitation.
Remediation advice
Affected organisations must review Cisco security advisory cisco-sa-snmp-x4LPhte and update to the latest fixed version and limit SNMP access to trusted users only as soon as possible.
Note: Cisco recommends using the Cisco Software Checker tool to determine fixed releases for affected platforms.
Remediation steps
| Type | Step |
|---|---|
| Patch |
Organisations must update to the latest fixed version of Cisco IOS or Cisco IOS XE as soon as possible. Note: Cisco recommends using the Cisco Software Checker tool to determine fixed releases for affected platforms. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte |
| Action |
Organisations must limit SNMP access on affected devices to trusted users only. It is best practice to restrict SNMP access to local trusted networks only. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte |
Definitive source of threat updates
Last edited: 25 September 2025 11:59 am