First published: Wed Feb 05 2025(Updated: )
Multiple vulnerabilities in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.For more information about these vulnerabilities, see the Details section of this advisory.Cisco plans to release software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. There are mitigations that address these vulnerabilities.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Web UI | ||
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-snmp-dos-sdxnSUcW is rated as critical due to its potential to cause a denial of service on affected devices.
To fix the cisco-sa-snmp-dos-sdxnSUcW vulnerability, update the affected Cisco IOS, IOS XE, or IOS XR software to the latest recommended release.
Cisco devices running IOS, IOS XE, and IOS XR Software are affected by the cisco-sa-snmp-dos-sdxnSUcW vulnerability.
Yes, the cisco-sa-snmp-dos-sdxnSUcW vulnerability can be exploited by an authenticated, remote attacker.
The cisco-sa-snmp-dos-sdxnSUcW vulnerability is classified as a denial-of-service (DoS) vulnerability within the SNMP subsystem.