Skip to main content

Active Exploitation of Zero-Day Vulnerability CVE-2025-20352 in Cisco IOS and IOS XE

Cisco has released a security advisory to address exploited vulnerability CVE-2025-20352 that could lead to remote code execution or a denial-of-service condition

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Cisco has released a security advisory to address exploited vulnerability CVE-2025-20352 that could lead to remote code execution or a denial-of-service condition


Threat details

Exploitation of CVE-2025-20352

Cisco has reported exploitation of CVE-2025-20352 in the wild. The NHS England National CSOC assesses further exploitation is highly likely.


Introduction

Cisco has released a security advisory to address a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco's IOS and IOS XE platforms. Cisco IOS and IOS XE are the operating systems for Cisco networking appliances.


Vulnerability details

  • CVE-2025-20352 is a "stack-based buffer overflow" vulnerability with a CVSSv3 score of 7.7. Successful exploitation could allow an authenticated, remote attacker to execute arbitrary code or cause a denial-of-service condition. To execute code remotely, an attacker must have either the SNMPv1 or SNMPv2c read-only community string; or valid SNMPv3 user credentials with administrative or privilege 15 permissions on the affected device. CVE-2025-20352 is under active exploitation.

Remediation advice

Affected organisations must review Cisco security advisory cisco-sa-snmp-x4LPhte and update to the latest fixed version and limit SNMP access to trusted users only as soon as possible.

Note: Cisco recommends using the Cisco Software Checker tool to determine fixed releases for affected platforms.


Remediation steps

Type Step
Patch

Organisations must update to the latest fixed version of Cisco IOS or Cisco IOS XE as soon as possible.

Note: Cisco recommends using the Cisco Software Checker tool to determine fixed releases for affected platforms.


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte
Action

Organisations must limit SNMP access on affected devices to trusted users only. It is best practice to restrict SNMP access to local trusted networks only.


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte


Last edited: 25 September 2025 11:59 am