Home

Description

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling when parsing a specific SNMP request. An attacker could exploit this vulnerability by sending a specific SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system.

PUBLISHED Reserved 2024-10-10 | Published 2025-09-24 | Updated 2025-09-24 | Assigner cisco




HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Problem types

Loop with Unreachable Exit Condition ('Infinite Loop')

Product status

17.2.1
affected

17.2.1r
affected

17.2.1a
affected

17.2.1v
affected

17.2.2
affected

17.2.3
affected

17.3.1
affected

17.3.2
affected

17.3.3
affected

17.3.1a
affected

17.3.1w
affected

17.3.2a
affected

17.3.1x
affected

17.3.1z
affected

17.3.4
affected

17.3.5
affected

17.3.4a
affected

17.3.6
affected

17.3.4b
affected

17.3.4c
affected

17.3.5a
affected

17.3.5b
affected

17.3.7
affected

17.3.8
affected

17.3.8a
affected

17.4.1
affected

17.4.2
affected

17.4.1a
affected

17.4.1b
affected

17.4.2a
affected

17.5.1
affected

17.5.1a
affected

17.6.1
affected

17.6.2
affected

17.6.1w
affected

17.6.1a
affected

17.6.1x
affected

17.6.3
affected

17.6.1y
affected

17.6.1z
affected

17.6.3a
affected

17.6.4
affected

17.6.1z1
affected

17.6.5
affected

17.6.6
affected

17.6.6a
affected

17.6.5a
affected

17.6.7
affected

17.6.8
affected

17.6.8a
affected

17.7.1
affected

17.7.1a
affected

17.7.1b
affected

17.7.2
affected

17.10.1
affected

17.10.1a
affected

17.10.1b
affected

17.8.1
affected

17.8.1a
affected

17.9.1
affected

17.9.1w
affected

17.9.2
affected

17.9.1a
affected

17.9.1x
affected

17.9.1y
affected

17.9.3
affected

17.9.2a
affected

17.9.1x1
affected

17.9.3a
affected

17.9.4
affected

17.9.1y1
affected

17.9.5
affected

17.9.4a
affected

17.9.5a
affected

17.9.5b
affected

17.9.6
affected

17.9.6a
affected

17.9.7
affected

17.9.5e
affected

17.9.5f
affected

17.9.7a
affected

17.9.7b
affected

17.11.1
affected

17.11.1a
affected

17.12.1
affected

17.12.1w
affected

17.12.1a
affected

17.12.1x
affected

17.12.2
affected

17.12.3
affected

17.12.2a
affected

17.12.1y
affected

17.12.1z
affected

17.12.4
affected

17.12.3a
affected

17.12.1z1
affected

17.12.1z2
affected

17.12.4a
affected

17.12.5
affected

17.12.4b
affected

17.12.1z3
affected

17.12.5a
affected

17.12.1z4
affected

17.12.5b
affected

17.12.5c
affected

17.13.1
affected

17.13.1a
affected

17.14.1
affected

17.14.1a
affected

17.15.1
affected

17.15.1w
affected

17.15.1a
affected

17.15.2
affected

17.15.1b
affected

17.15.1x
affected

17.15.1z
affected

17.15.3
affected

17.15.2c
affected

17.15.2a
affected

17.15.1y
affected

17.15.2b
affected

17.15.3a
affected

17.15.3b
affected

17.16.1
affected

17.16.1a
affected

17.17.1
affected

References

sec.cloudapps.cisco.com/...visory/cisco-sa-snmpwred-x3MJyf5M (cisco-sa-snmpwred-x3MJyf5M)

cve.org (CVE-2025-20312)

nvd.nist.gov (CVE-2025-20312)

Download JSON