PT-2025-39307 · Cisco · Cisco Ios +1
Published
2025-09-24
·
Updated
2025-11-19
·
CVE-2025-20352
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Cisco IOS and IOS XE Software versions prior to IOS XE 17.15.4a
Description
A vulnerability exists in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software. This flaw, a stack overflow condition, allows an authenticated remote attacker with low privileges to cause a denial of service (DoS) condition by sending a crafted SNMP packet. An attacker with high privileges can execute code as the root user, gaining full control of the system. This vulnerability is actively exploited in the wild, with attackers deploying Linux rootkits. Operation Zero Disco is the name given to the campaign exploiting this flaw. Approximately 1.2 million devices are potentially exposed. The vulnerability affects all versions of SNMP. Attackers are leveraging SNMPv1 or v2c with read-only community strings or valid SNMPv3 credentials to exploit the vulnerability.
Recommendations
Update Cisco IOS and IOS XE Software to version 17.15.4a or later.
Restrict SNMP access to trusted hosts.
Consider disabling SNMPv1 and v2c and transitioning to SNMPv3 with authentication and encryption.
Monitor for unusual SNMP traffic and potential signs of compromise.
Fix
RCE
DoS
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-12385
CVE-2025-20352
Affected Products
Cisco Ios
Cisco Ios Xe
References · 181
- https://safe-surf.ru/specialists/bulletins-nkcki/724908 · Security Note
- https://bdu.fstec.ru/vul/2025-12385 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-20352 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte · Vendor Advisory
- https://reddit.com/r/SecOpsDaily/comments/1nue1bj/cve202541244_vulnerability_a_new_vmware_tools_and · Reddit Post
- https://twitter.com/zeeshankghouri/status/1971132609867678127 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1971177859554165181 · Twitter Post
- https://twitter.com/CCBalert/status/1973310236468428837 · Twitter Post
- https://t.me/netlas/491 · Telegram Post
- https://twitter.com/wvipersg/status/1971152269635707079 · Twitter Post
- https://twitter.com/zeeshankghouri/status/1971787364579315892 · Twitter Post
- https://twitter.com/virtuallyfun/status/1972262321130266786 · Twitter Post
- https://twitter.com/PVynckier/status/1979457140780667152 · Twitter Post
- https://twitter.com/PurpleOps_io/status/1970956538048045401 · Twitter Post
- https://t.me/CSIRT_italia/2758 · Telegram Post