SB2025020624 - Multiple DoS vulnerabilities in Cisco IOS XR SNMP subsystem
Published: February 6, 2025 Updated: May 2, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Improper error handling (CVE-ID: CVE-2025-20169)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling in the SNMP subsystem. A remote authenticated user can send specially crafted SNMP versions 1, 2c, or 3 requests to the affected system and perform a denial of service (DoS) attack.
2) Improper error handling (CVE-ID: CVE-2025-20170)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling in the SNMP subsystem. A remote authenticated user can send specially crafted SNMP versions 1, 2c, or 3 requests to the affected system and perform a denial of service (DoS) attack.
3) Improper error handling (CVE-ID: CVE-2025-20171)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling in the SNMP subsystem. A remote authenticated user can send specially crafted SNMP versions 1, 2c, or 3 requests to the affected system and perform a denial of service (DoS) attack.
4) Improper error handling (CVE-ID: CVE-2025-20172)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling in the SNMP subsystem. A remote authenticated user can send specially crafted SNMP versions 1, 2c, or 3 requests to the affected system and perform a denial of service (DoS) attack.
5) Improper error handling (CVE-ID: CVE-2025-20173)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling in the SNMP subsystem. A remote authenticated user can send specially crafted SNMP versions 1, 2c, or 3 requests to the affected system and perform a denial of service (DoS) attack.
6) Improper error handling (CVE-ID: CVE-2025-20174)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling in the SNMP subsystem. A remote authenticated user can send specially crafted SNMP versions 1, 2c, or 3 requests to the affected system and perform a denial of service (DoS) attack.
7) Improper error handling (CVE-ID: CVE-2025-20175)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling in the SNMP subsystem. A remote authenticated user can send specially crafted SNMP versions 1, 2c, or 3 requests to the affected system and perform a denial of service (DoS) attack.
8) Improper error handling (CVE-ID: CVE-2025-20176)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling in the SNMP subsystem. A remote authenticated user can send specially crafted SNMP versions 1, 2c, or 3 requests to the affected system and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW
- https://www.zerodayinitiative.com/advisories/ZDI-25-270/
- https://www.zerodayinitiative.com/advisories/ZDI-25-280/
- https://www.zerodayinitiative.com/advisories/ZDI-25-275/
- https://www.zerodayinitiative.com/advisories/ZDI-25-271/
- https://www.zerodayinitiative.com/advisories/ZDI-25-272/
- https://www.zerodayinitiative.com/advisories/ZDI-25-274/
- https://www.zerodayinitiative.com/advisories/ZDI-25-273/
- https://www.zerodayinitiative.com/advisories/ZDI-25-279/
- https://www.zerodayinitiative.com/advisories/ZDI-25-276/
- https://www.zerodayinitiative.com/advisories/ZDI-25-277/
- https://www.zerodayinitiative.com/advisories/ZDI-25-281/
- https://www.zerodayinitiative.com/advisories/ZDI-25-278/