First published: Wed May 07 2025(Updated: )
A vulnerability in the Switch Integrated Security Features (SISF) of Cisco IOS Software, Cisco IOS XE Software, Cisco NX-OS Software, and Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to the incorrect handling of DHCPv6 packets. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE | ||
Cisco NX-OS | ||
Cisco Wireless LAN Controller (WLC) AireOS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-20191 is high, as it can allow an unauthenticated attacker to cause a denial of service.
To fix CVE-2025-20191, update the affected Cisco software to the latest version provided by Cisco.
CVE-2025-20191 affects Cisco IOS Software, Cisco IOS XE Software, Cisco NX-OS Software, and Cisco Wireless LAN Controller AireOS Software.
CVE-2025-20191 can lead to a denial of service condition, potentially disrupting network operations.
Currently, the best mitigation for CVE-2025-20191 is to apply available software updates from Cisco.