Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Trump’s cyber technique emphasizes offensive operations, deregulation, AI

    March 7, 2026

    The WIRED Information to Wires: How one can Handle the Mess of Cables Round Your Desk

    March 7, 2026

    Constructing {custom} mannequin supplier for Strands Brokers with LLMs hosted on SageMaker AI endpoints

    March 7, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Cisco Warns of Actively Exploited SNMP Vulnerability Permitting RCE or DoS in IOS Software program
    AI Ethics & Regulation

    Cisco Warns of Actively Exploited SNMP Vulnerability Permitting RCE or DoS in IOS Software program

    Declan MurphyBy Declan MurphySeptember 25, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Cisco Warns of Actively Exploited SNMP Vulnerability Permitting RCE or DoS in IOS Software program
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Sep 25, 2025Ravie LakshmananVulnerability / Community Safety

    Cisco has warned of a high-severity safety flaw in IOS Software program and IOS XE Software program that would permit a distant attacker to execute arbitrary code or set off a denial-of-service (DoS) situation below particular circumstances.

    The corporate stated the vulnerability, CVE-2025-20352 (CVSS rating: 7.7), has been exploited within the wild, including it turned conscious of it “after native Administrator credentials had been compromised.”

    The problem, per the networking gear main, is rooted within the Easy Community Administration Protocol (SNMP) subsystem, arising on account of a stack overflow situation.

    An authenticated, distant attacker might exploit the flaw by sending a crafted SNMP packet to an affected system over IPv4 or IPv6 networks, leading to DoS if they’ve low privileges or arbitrary code execution as root if they’ve excessive privileges and in the end take management of the prone system.

    CIS Build Kits

    Nonetheless, Cisco famous that for this to occur, the next situations have to be met –

    • To trigger the DoS, the attacker should have the SNMPv2c or earlier read-only neighborhood string or legitimate SNMPv3 consumer credentials
    • To execute code as the basis consumer, the attacker should have the SNMPv1 or v2c read-only neighborhood string or legitimate SNMPv3 consumer credentials and administrative or privilege 15 credentials on the affected system

    The corporate stated the problem impacts all variations of SNMP, in addition to Meraki MS390 and Cisco Catalyst 9300 Collection Switches which can be working Meraki CS 17 and earlier. It has been fastened in Cisco IOS XE Software program Launch 17.15.4a. Cisco IOS XR Software program and NX-OS Software program should not impacted.

    “This vulnerability impacts all variations of SNMP. All gadgets which have SNMP enabled and haven’t explicitly excluded the affected object ID (OID) ought to be thought of weak,” Cisco stated.

    Whereas there are not any workarounds that resolve CVE-2025-20352, one mitigation proposed by Cisco entails permitting solely trusted customers to have SNMP entry on an affected system, and monitoring the methods by working the “present snmp host” command.

    “Directors can disable the affected OIDs on a tool,” it added. “Not all software program will assist the OID that’s listed within the mitigation. If the OID just isn’t legitimate for particular software program, then it isn’t affected by this vulnerability. Excluding these OIDs might have an effect on system administration by way of SNMP, equivalent to discovery and {hardware} stock.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Trump’s cyber technique emphasizes offensive operations, deregulation, AI

    March 7, 2026

    Hackers Unfold Pretend Purple Alert Rocket Alert App to Spy on Israeli Customers

    March 7, 2026

    Clear Tribe Makes use of AI to Mass-Produce Malware Implants in Marketing campaign Concentrating on India

    March 7, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Trump’s cyber technique emphasizes offensive operations, deregulation, AI

    By Declan MurphyMarch 7, 2026

    Palo Alto Networks CEO Nikesh Arora stated in an announcement, “I commend ONCD Director [Sean]…

    The WIRED Information to Wires: How one can Handle the Mess of Cables Round Your Desk

    March 7, 2026

    Constructing {custom} mannequin supplier for Strands Brokers with LLMs hosted on SageMaker AI endpoints

    March 7, 2026

    Pricing Choices and Practical Scope

    March 7, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.