A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
30 Oct 2025, 21:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:* |
Information
Published : 2025-02-05 17:15
Updated : 2025-10-30 21:13
NVD link : CVE-2025-20169
Mitre link : CVE-2025-20169
CVE.ORG link : CVE-2025-20169
JSON object : View
Products Affected
cisco
- ios
- ios_xe
CWE
CWE-805
Buffer Access with Incorrect Length Value
