First published: Wed Feb 05 2025(Updated: )
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20174 has a high severity rating due to its potential to cause a denial of service (DoS) condition.
To fix CVE-2025-20174, ensure that you upgrade to a patched version of Cisco IOS Software or Cisco IOS XE Software as provided by Cisco.
CVE-2025-20174 affects devices running specific versions of Cisco IOS Software and Cisco IOS XE Software that utilize the SNMP subsystem.
CVE-2025-20174 allows an authenticated, remote attacker to exploit the vulnerability and cause a denial of service condition.
CVE-2025-20174 results from improper error handling when parsing SNMP requests, which an attacker can exploit to disrupt device functionality.