First published: Wed May 07 2025(Updated: )
A vulnerability in the DHCP snooping security feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a full interface queue wedge, which could result in a denial of service (DoS) condition. This vulnerability is due to improper handling of DHCP request packets. An attacker could exploit this vulnerability by sending DHCP request packets to an affected device. A successful exploit could allow the attacker to cause packets to wedge in the queue, creating a DoS condition for downstream devices of the affected system and requiring that the system restart to drain the queue. Note: This vulnerability can be exploited with either unicast or broadcast DHCP packets on a VLAN that does not have DHCP snooping enabled.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20162 has a high severity rating as it can lead to a denial of service (DoS) condition.
To fix CVE-2025-20162, update your Cisco IOS XE Software to the latest version that addresses this vulnerability.
CVE-2025-20162 enables a denial of service (DoS) attack by causing a full interface queue wedge.
Organizations using Cisco IOS XE Software with DHCP snooping enabled are affected by CVE-2025-20162.
Yes, CVE-2025-20162 can be exploited by an unauthenticated, remote attacker.