Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability

cisco-sa-snmpwred-x3MJyf5M · High · Published · Updated

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling when parsing a specific SNMP request. An attacker could exploit this vulnerability by sending a specific SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. However, there is a mitigation. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpwred-x3MJyf5M This advisory is part of the September 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability. However, as a mitigation, administrators can disable the vulnerable object identifier (OID) on a device.

Disable the Affected OID

As a best practice, SNMP access should be allowed only from trusted network devices. For configuration options, see Secure Your Simple Network Management Protocol ["https://www.cisco.com/c/en/us/support/docs/ip/simple-network-management-protocol-snmp/20370-snmpsecurity-20370.html#toc-hId-908187620"].

To disable the OID, complete the following steps:

1. Create an SNMP view with the standard security configurations.

snmp-server view SNMP_DOS iso included
snmp-server view SNMP_DOS snmpUsmMIB excluded
snmp-server view SNMP_DOS snmpVacmMIB excluded
snmp-server view SNMP_DOS snmpCommunityMIB excluded

2. Exclude the vulnerable OID from the SNMP view.

snmp-server view SNMP_DOS cbQosREDClassStatsEntry excluded

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2025-20312
Cisco Bug IDsCSCwp03900
CVSS ScoreBase 7.7
Base 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XE Software 17.2.1, Cisco IOS XE Software 17.2.1r, Cisco IOS XE Software 17.2.1a, Cisco IOS XE Software 17.2.1v, Cisco IOS XE Software 17.2.2, Cisco IOS XE Software 17.2.3, Cisco IOS XE Software 17.3.1, Cisco IOS XE Software 17.3.2, Cisco IOS XE Software 17.3.3, Cisco IOS XE Software 17.3.1a, Cisco IOS XE Software 17.3.1w, Cisco IOS XE Software 17.3.2a, Cisco IOS XE Software 17.3.1x, Cisco IOS XE Software 17.3.1z, Cisco IOS XE Software 17.3.3a, Cisco IOS XE Software 17.3.4, Cisco IOS XE Software 17.3.5, Cisco IOS XE Software 17.3.4a, Cisco IOS XE Software 17.3.6, Cisco IOS XE Software 17.3.4b, Cisco IOS XE Software 17.3.4c, Cisco IOS XE Software 17.3.5a, Cisco IOS XE Software 17.3.5b, Cisco IOS XE Software 17.3.7, Cisco IOS XE Software 17.3.8, Cisco IOS XE Software 17.3.8a, Cisco IOS XE Software 17.4.1, Cisco IOS XE Software 17.4.2, Cisco IOS XE Software 17.4.1a, Cisco IOS XE Software 17.4.1b, Cisco IOS XE Software 17.4.1c, Cisco IOS XE Software 17.4.2a, Cisco IOS XE Software 17.5.1, Cisco IOS XE Software 17.5.1a, Cisco IOS XE Software 17.6.1, Cisco IOS XE Software 17.6.2, Cisco IOS XE Software 17.6.1w, Cisco IOS XE Software 17.6.1a, Cisco IOS XE Software 17.6.1x, Cisco IOS XE Software 17.6.3, Cisco IOS XE Software 17.6.1y, Cisco IOS XE Software 17.6.1z, Cisco IOS XE Software 17.6.3a, Cisco IOS XE Software 17.6.4, Cisco IOS XE Software 17.6.1z1, Cisco IOS XE Software 17.6.5, Cisco IOS XE Software 17.6.6, Cisco IOS XE Software 17.6.6a, Cisco IOS XE Software 17.6.5a, Cisco IOS XE Software 17.6.7, Cisco IOS XE Software 17.6.8, Cisco IOS XE Software 17.6.8a, Cisco IOS XE Software 17.7.1, Cisco IOS XE Software 17.7.1a, Cisco IOS XE Software 17.7.1b, Cisco IOS XE Software 17.7.2, Cisco IOS XE Software 17.10.1, Cisco IOS XE Software 17.10.1a, Cisco IOS XE Software 17.10.1b, Cisco IOS XE Software 17.8.1, Cisco IOS XE Software 17.8.1a, Cisco IOS XE Software 17.9.1, Cisco IOS XE Software 17.9.1w, Cisco IOS XE Software 17.9.2, Cisco IOS XE Software 17.9.1a, Cisco IOS XE Software 17.9.1x, Cisco IOS XE Software 17.9.1y, Cisco IOS XE Software 17.9.3, Cisco IOS XE Software 17.9.2a, Cisco IOS XE Software 17.9.1x1, Cisco IOS XE Software 17.9.3a, Cisco IOS XE Software 17.9.4, Cisco IOS XE Software 17.9.1y1, Cisco IOS XE Software 17.9.5, Cisco IOS XE Software 17.9.4a, Cisco IOS XE Software 17.9.5a, Cisco IOS XE Software 17.9.5b, Cisco IOS XE Software 17.9.6, Cisco IOS XE Software 17.9.5c, Cisco IOS XE Software 17.9.5d, Cisco IOS XE Software 17.9.6a, Cisco IOS XE Software 17.9.6b, Cisco IOS XE Software 17.9.7, Cisco IOS XE Software 17.9.5e, Cisco IOS XE Software 17.9.5f, Cisco IOS XE Software 17.9.7a, Cisco IOS XE Software 17.9.7b, Cisco IOS XE Software 17.11.1, Cisco IOS XE Software 17.11.1a, Cisco IOS XE Software 17.12.1, Cisco IOS XE Software 17.12.1w, Cisco IOS XE Software 17.12.1a, Cisco IOS XE Software 17.12.1x, Cisco IOS XE Software 17.12.2, Cisco IOS XE Software 17.12.3, Cisco IOS XE Software 17.12.2a, Cisco IOS XE Software 17.12.1y, Cisco IOS XE Software 17.12.1z, Cisco IOS XE Software 17.12.4, Cisco IOS XE Software 17.12.3a, Cisco IOS XE Software 17.12.1z1, Cisco IOS XE Software 17.12.1z2, Cisco IOS XE Software 17.12.4a, Cisco IOS XE Software 17.12.5, Cisco IOS XE Software 17.12.4b, Cisco IOS XE Software 17.12.1z3, Cisco IOS XE Software 17.12.5a, Cisco IOS XE Software 17.12.1z4, Cisco IOS XE Software 17.12.5b, Cisco IOS XE Software 17.12.5c, Cisco IOS XE Software 17.13.1, Cisco IOS XE Software 17.13.1a, Cisco IOS XE Software 17.14.1, Cisco IOS XE Software 17.14.1a, Cisco IOS XE Software 17.15.1, Cisco IOS XE Software 17.15.1w, Cisco IOS XE Software 17.15.1a, Cisco IOS XE Software 17.15.2, Cisco IOS XE Software 17.15.1b, Cisco IOS XE Software 17.15.1x, Cisco IOS XE Software 17.15.3, Cisco IOS XE Software 17.15.2c, Cisco IOS XE Software 17.15.2a, Cisco IOS XE Software 17.15.1y, Cisco IOS XE Software 17.15.2b, Cisco IOS XE Software 17.15.3a, Cisco IOS XE Software 17.15.3b, Cisco IOS XE Software 17.16.1, Cisco IOS XE Software 17.16.1a, Cisco IOS XE Software 17.17.1, Cisco IOS, Cisco IOS XE Software

Related Products

Product CVE Evidence
Cisco IOS CVE-2025-20312 Cisco OpenVuln
Cisco IOS XE Software CVE-2025-20312 Cisco OpenVuln
Cisco Catalyst 9600 Series Switches CVE-2025-20312 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2025-20312 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2025-20312 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2025-20312 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2025-20312 Cisco OpenVuln · software-dependent