Emergency Notice – Cisco fixes actively exploited zero-day and multiple vulnerabilities in IOS and IOS XE

Cisco has disclosed 14 security vulnerabilities in its IOS and IOS XE systems, including a critical zero-day that is already being actively exploited by cybercriminals. The zero-day in question, identified as CVE-2025-20352, with a CVSS score of 7.7, affects the SNMP protocol and allows code execution with root privileges on network devices.

The company has confirmed active attacks exploiting this flaw after compromising local administrative credentials. Depending on the attacker’s privileges, exploitation can result in denial of service or full code execution as root.

In addition to the zero-day, other vulnerabilities stand out: CVE-2025-20334 (CVSS 8.8) allows command injection into the IOS XE HTTP API, enabling arbitrary code execution as root; CVE-2025-20160 (CVSS 8.1) represents authentication bypass in TACACS+; and CVE-2025-20315 (CVSS 8.6) can lead to denial of service.

Cisco has released software updates that should be applied immediately. The recommended patched version is IOS XE Release 17.15.4a or higher. As temporary mitigations, you can restrict SNMP access to trusted users, disable affected OIDs, and monitor connections using the command show snmp host.

Find out more at:

https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75296

SEK emphasizes that this situation requires an immediate response due to confirmed active exploitation. Organizations that delay corrections are exposed to a total compromise of critical infrastructure. We remain available to support our customers in implementing the necessary measures.

 

More content like this:

Clop Group Exploits Critical Zero-Day Vulnerability in Oracle E-Business Suite

Oracle has confirmed the active exploitation of a critical zero-day vulnerability in E-Business Suite (EBS), identified as CVE-2025-61882

Zabbix releases fixes for three vulnerabilities in monitoring agents

Zabbix has disclosed three security vulnerabilities affecting multiple versions of its monitoring agents and servers.

Privacy Overview
SEK

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Additional Cookies

This website uses the following additional cookies:

(List the cookies that you are using on the website here.)