Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2025-AVI-0818
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Cisco IOS et IOS XE. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Cisco indique que la vulnérabilité CVE-2025-20352 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
References
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "IOS XE, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les versions vuln\u00e9rables (cf. section Documentation)", "product": { "name": "IOS XE", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "IOS, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les versions vuln\u00e9rables (cf. section Documentation)", "product": { "name": "IOS", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-20334", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20334" }, { "name": "CVE-2025-20160", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20160" }, { "name": "CVE-2025-20313", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20313" }, { "name": "CVE-2025-20327", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20327" }, { "name": "CVE-2025-20311", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20311" }, { "name": "CVE-2025-20315", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20315" }, { "name": "CVE-2025-20312", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20312" }, { "name": "CVE-2025-20352", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20352" }, { "name": "CVE-2025-20314", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20314" } ], "initial_release_date": "2025-09-25T00:00:00", "last_revision_date": "2025-09-25T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0818", "revisions": [ { "description": "Version initiale", "revision_date": "2025-09-25T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Cisco IOS et IOS XE. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n\nCisco indique que la vuln\u00e9rabilit\u00e9 CVE-2025-20352 est activement exploit\u00e9e.\n\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Cisco IOS et IOS XE", "vendor_advisories": [ { "published_at": "2025-09-24", "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cat9k-PtmD7bgy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat9k-PtmD7bgy" }, { "published_at": "2025-09-24", "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-tacacs-hdB7thJw", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-hdB7thJw" }, { "published_at": "2025-09-24", "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-snmpwred-x3MJyf5M", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpwred-x3MJyf5M" }, { "published_at": "2025-09-24", "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-snmp-x4LPhte", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte" }, { "published_at": "2025-09-24", "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-xe-cmd-inject-rPJM8BGL", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-inject-rPJM8BGL" }, { "published_at": "2025-09-24", "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-invalid-url-dos-Nvxszf6u", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-invalid-url-dos-Nvxszf6u" }, { "published_at": "2025-09-24", "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-nbar-dos-LAvwTmeT", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nbar-dos-LAvwTmeT" }, { "published_at": "2025-09-24", "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-secboot-UqFD8AvC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD8AvC" } ] }
CVE-2025-20311 (GCVE-0-2025-20311)
Vulnerability from cvelistv5
Published
2025-09-24 17:12
Modified
2025-09-30 14:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-19 - Data Handling
Summary
A vulnerability in the handling of certain Ethernet frames in Cisco IOS XE Software for Catalyst 9000 Series Switches could allow an unauthenticated, adjacent attacker to cause an egress port to become blocked and drop all outbound traffic.
This vulnerability is due to improper handling of crafted Ethernet frames. An attacker could exploit this vulnerability by sending crafted Ethernet frames through an affected switch. A successful exploit could allow the attacker to cause the egress port to which the crafted frame is forwarded to start dropping all frames, resulting in a denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: 16.6.1 Version: 16.6.2 Version: 16.6.3 Version: 16.6.4 Version: 16.6.5 Version: 16.6.4a Version: 16.6.6 Version: 16.6.7 Version: 16.6.8 Version: 16.6.9 Version: 16.6.10 Version: 16.7.1 Version: 16.8.1 Version: 16.8.1a Version: 16.8.1s Version: 16.9.1 Version: 16.9.2 Version: 16.9.1s Version: 16.9.3 Version: 16.9.4 Version: 16.9.5 Version: 16.9.6 Version: 16.9.7 Version: 16.9.8 Version: 16.10.1 Version: 16.10.1s Version: 16.10.1e Version: 16.11.1 Version: 16.11.1b Version: 16.11.1s Version: 16.12.1 Version: 16.12.1s Version: 16.12.1c Version: 16.12.2 Version: 16.12.3 Version: 16.12.8 Version: 16.12.2s Version: 16.12.4 Version: 16.12.3s Version: 16.12.3a Version: 16.12.4a Version: 16.12.5 Version: 16.12.6 Version: 16.12.5b Version: 16.12.6a Version: 16.12.7 Version: 16.12.14 Version: 17.1.1 Version: 17.1.1s Version: 17.1.1t Version: 17.1.3 Version: 17.2.1 Version: 17.2.1a Version: 17.3.1 Version: 17.3.2 Version: 17.3.3 Version: 17.3.2a Version: 17.3.4 Version: 17.3.5 Version: 17.3.6 Version: 17.3.4b Version: 17.3.7 Version: 17.3.8 Version: 17.3.8a Version: 17.4.1 Version: 17.5.1 Version: 17.6.1 Version: 17.6.2 Version: 17.6.3 Version: 17.6.1y Version: 17.6.4 Version: 17.6.5 Version: 17.6.6 Version: 17.6.6a Version: 17.6.5a Version: 17.6.7 Version: 17.6.8 Version: 17.7.1 Version: 17.10.1 Version: 17.10.1b Version: 17.8.1 Version: 17.9.1 Version: 17.9.2 Version: 17.9.3 Version: 17.9.4 Version: 17.9.5 Version: 17.9.4a Version: 17.9.6 Version: 17.9.6a Version: 17.11.1 Version: 17.12.1 Version: 17.12.2 Version: 17.12.3 Version: 17.12.4 Version: 17.12.1z3 Version: 17.13.1 Version: 17.14.1 Version: 17.11.99SW Version: 17.15.1 Version: 17.15.2 Version: 17.15.2a Version: 17.15.2b Version: 17.16.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20311", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T18:07:27.423618Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-24T18:07:39.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "16.6.1" }, { "status": "affected", "version": "16.6.2" }, { "status": "affected", "version": "16.6.3" }, { "status": "affected", "version": "16.6.4" }, { "status": "affected", "version": "16.6.5" }, { "status": "affected", "version": "16.6.4a" }, { "status": "affected", "version": "16.6.6" }, { "status": "affected", "version": "16.6.7" }, { "status": "affected", "version": "16.6.8" }, { "status": "affected", "version": "16.6.9" }, { "status": "affected", "version": "16.6.10" }, { "status": "affected", "version": "16.7.1" }, { "status": "affected", "version": "16.8.1" }, { "status": "affected", "version": "16.8.1a" }, { "status": "affected", "version": "16.8.1s" }, { "status": "affected", "version": "16.9.1" }, { "status": "affected", "version": "16.9.2" }, { "status": "affected", "version": "16.9.1s" }, { "status": "affected", "version": "16.9.3" }, { "status": "affected", "version": "16.9.4" }, { "status": "affected", "version": "16.9.5" }, { "status": "affected", "version": "16.9.6" }, { "status": "affected", "version": "16.9.7" }, { "status": "affected", "version": "16.9.8" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "16.10.1s" }, { "status": "affected", "version": "16.10.1e" }, { "status": "affected", "version": "16.11.1" }, { "status": "affected", "version": "16.11.1b" }, { "status": "affected", "version": "16.11.1s" }, { "status": "affected", "version": "16.12.1" }, { "status": "affected", "version": "16.12.1s" }, { "status": "affected", "version": "16.12.1c" }, { "status": "affected", "version": "16.12.2" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "16.12.2s" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.3s" }, { "status": "affected", "version": "16.12.3a" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "16.12.5b" }, { "status": "affected", "version": "16.12.6a" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "16.12.14" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "17.1.1s" }, { "status": "affected", "version": "17.1.1t" }, { "status": "affected", "version": "17.1.3" }, { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.1z3" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.11.99SW" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.16.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the handling of certain Ethernet frames in Cisco IOS XE Software for Catalyst 9000 Series Switches could allow an unauthenticated, adjacent attacker to cause an egress port to become blocked and drop all outbound traffic.\r\n\r This vulnerability is due to improper handling of crafted Ethernet frames. An attacker could exploit this vulnerability by sending crafted Ethernet frames through an affected switch. A successful exploit could allow the attacker to cause the egress port to which the crafted frame is forwarded to start dropping all frames, resulting in a denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-19", "description": "Data Handling", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T14:28:26.310Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cat9k-PtmD7bgy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat9k-PtmD7bgy" } ], "source": { "advisory": "cisco-sa-cat9k-PtmD7bgy", "defects": [ "CSCwn45401" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20311", "datePublished": "2025-09-24T17:12:06.928Z", "dateReserved": "2024-10-10T19:15:13.253Z", "dateUpdated": "2025-09-30T14:28:26.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20313 (GCVE-0-2025-20313)
Vulnerability from cvelistv5
Published
2025-09-24 17:12
Modified
2025-10-15 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-35 - Path Traversal
Summary
Multiple vulnerabilities in Cisco IOS XE Software of could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.
These vulnerabilities are due path traversal and improper image integrity validation. A successful exploit could allow the attacker to execute persistent code on the underlying operating system.
Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
ERP
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: 17.3.1 Version: 17.3.2 Version: 17.3.3 Version: 17.3.1a Version: 17.3.1w Version: 17.3.2a Version: 17.3.1x Version: 17.3.1z Version: 17.3.4 Version: 17.3.5 Version: 17.3.4a Version: 17.3.6 Version: 17.3.4b Version: 17.3.4c Version: 17.3.5a Version: 17.3.5b Version: 17.3.7 Version: 17.3.8 Version: 17.3.8a Version: 17.4.1 Version: 17.4.2 Version: 17.4.1a Version: 17.4.1b Version: 17.4.2a Version: 17.5.1 Version: 17.5.1a Version: 17.6.1 Version: 17.6.2 Version: 17.6.1w Version: 17.6.1a Version: 17.6.1x Version: 17.6.3 Version: 17.6.1y Version: 17.6.1z Version: 17.6.3a Version: 17.6.4 Version: 17.6.1z1 Version: 17.6.5 Version: 17.6.6 Version: 17.6.6a Version: 17.6.5a Version: 17.6.7 Version: 17.6.8 Version: 17.6.8a Version: 17.7.1 Version: 17.7.1a Version: 17.7.1b Version: 17.7.2 Version: 17.10.1 Version: 17.10.1a Version: 17.10.1b Version: 17.8.1 Version: 17.8.1a Version: 17.9.1 Version: 17.9.1w Version: 17.9.2 Version: 17.9.1a Version: 17.9.1x Version: 17.9.1y Version: 17.9.3 Version: 17.9.2a Version: 17.9.1x1 Version: 17.9.3a Version: 17.9.4 Version: 17.9.1y1 Version: 17.9.5 Version: 17.9.4a Version: 17.9.5a Version: 17.9.5b Version: 17.9.6 Version: 17.9.6a Version: 17.9.7 Version: 17.9.5e Version: 17.9.5f Version: 17.9.7a Version: 17.9.7b Version: 17.11.1 Version: 17.11.1a Version: 17.12.1 Version: 17.12.1w Version: 17.12.1a Version: 17.12.1x Version: 17.12.2 Version: 17.12.3 Version: 17.12.2a Version: 17.12.1y Version: 17.12.1z Version: 17.12.4 Version: 17.12.3a Version: 17.12.1z1 Version: 17.12.1z2 Version: 17.12.4a Version: 17.12.5 Version: 17.12.4b Version: 17.12.1z3 Version: 17.12.5a Version: 17.12.1z4 Version: 17.12.5b Version: 17.12.5c Version: 17.13.1 Version: 17.13.1a Version: 17.14.1 Version: 17.14.1a Version: 17.15.1 Version: 17.15.1w Version: 17.15.1a Version: 17.15.2 Version: 17.15.1b Version: 17.15.1x Version: 17.15.3 Version: 17.15.2c Version: 17.15.2a Version: 17.15.1y Version: 17.15.2b Version: 17.15.3a Version: 17.15.3b Version: 17.16.1 Version: 17.16.1a Version: 17.17.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20313", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T03:56:00.804Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "17.3.1w" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.1x" }, { "status": "affected", "version": "17.3.1z" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.4.2a" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.1w" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "17.6.1x" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.1z" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.1z1" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.6.8a" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "17.7.1b" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1a" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.1w" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.9.1x" }, { "status": "affected", "version": "17.9.1y" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.9.1x1" }, { "status": "affected", "version": "17.9.3a" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.1y1" }, { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.9.5a" }, { "status": "affected", "version": "17.9.5b" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.9.7" }, { "status": "affected", "version": "17.9.5e" }, { "status": "affected", "version": "17.9.5f" }, { "status": "affected", "version": "17.9.7a" }, { "status": "affected", "version": "17.9.7b" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.1w" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.12.1x" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.2a" }, { "status": "affected", "version": "17.12.1y" }, { "status": "affected", "version": "17.12.1z" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.1z1" }, { "status": "affected", "version": "17.12.1z2" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.12.5" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.12.1z3" }, { "status": "affected", "version": "17.12.5a" }, { "status": "affected", "version": "17.12.1z4" }, { "status": "affected", "version": "17.12.5b" }, { "status": "affected", "version": "17.12.5c" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.13.1a" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.14.1a" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.1w" }, { "status": "affected", "version": "17.15.1a" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.1b" }, { "status": "affected", "version": "17.15.1x" }, { "status": "affected", "version": "17.15.3" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.1y" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.15.3a" }, { "status": "affected", "version": "17.15.3b" }, { "status": "affected", "version": "17.16.1" }, { "status": "affected", "version": "17.16.1a" }, { "status": "affected", "version": "17.17.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in Cisco IOS XE Software of could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r These vulnerabilities are due path traversal and improper image integrity validation. A successful exploit could allow the attacker to execute persistent code on the underlying operating system.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.\r\n\r For more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r \r\n\r \r\n\r \r\n\r ERP" } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-35", "description": "Path Traversal", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-15T16:18:50.961Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-secboot-UqFD8AvC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD8AvC" } ], "source": { "advisory": "cisco-sa-secboot-UqFD8AvC", "defects": [ "CSCwo38903" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20313", "datePublished": "2025-09-24T17:12:40.484Z", "dateReserved": "2024-10-10T19:15:13.253Z", "dateUpdated": "2025-10-15T16:18:50.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20334 (GCVE-0-2025-20334)
Vulnerability from cvelistv5
Published
2025-09-24 17:07
Modified
2025-09-25 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A vulnerability in the HTTP API subsystem of Cisco IOS XE Software could allow a remote attacker to inject commands that will execute with root privileges into the underlying operating system.
This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by authenticating to an affected system and performing an API call with crafted input. Alternatively, an unauthenticated attacker could persuade a legitimate user with administrative privileges who is currently logged in to the system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: 17.9.5 Version: 17.9.5a Version: 17.9.5b Version: 17.9.6 Version: 17.9.6a Version: 17.9.7 Version: 17.9.5e Version: 17.9.5f Version: 17.9.7a Version: 17.9.7b Version: 17.12.2 Version: 17.12.3 Version: 17.12.2a Version: 17.12.4 Version: 17.12.3a Version: 17.12.4a Version: 17.12.5 Version: 17.12.4b Version: 17.12.5a Version: 17.12.5b Version: 17.12.5c Version: 17.13.1 Version: 17.13.1a Version: 17.14.1 Version: 17.14.1a Version: 17.15.1 Version: 17.15.1w Version: 17.15.1a Version: 17.15.2 Version: 17.15.1b Version: 17.15.1x Version: 17.15.1z Version: 17.15.2c Version: 17.15.2a Version: 17.15.1y Version: 17.15.2b Version: 17.16.1 Version: 17.16.1a |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20334", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T03:55:55.720Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.5a" }, { "status": "affected", "version": "17.9.5b" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.9.7" }, { "status": "affected", "version": "17.9.5e" }, { "status": "affected", "version": "17.9.5f" }, { "status": "affected", "version": "17.9.7a" }, { "status": "affected", "version": "17.9.7b" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.2a" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.12.5" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.12.5a" }, { "status": "affected", "version": "17.12.5b" }, { "status": "affected", "version": "17.12.5c" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.13.1a" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.14.1a" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.1w" }, { "status": "affected", "version": "17.15.1a" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.1b" }, { "status": "affected", "version": "17.15.1x" }, { "status": "affected", "version": "17.15.1z" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.1y" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.16.1" }, { "status": "affected", "version": "17.16.1a" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the HTTP API subsystem of Cisco IOS XE Software could allow a remote attacker to inject commands that will execute with root privileges into the underlying operating system.\r\n\r This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by authenticating to an affected system and performing an API call with crafted input. Alternatively, an unauthenticated attacker could persuade a legitimate user with administrative privileges who is currently logged in to the system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary commands as the root user." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-24T17:07:48.420Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ios-xe-cmd-inject-rPJM8BGL", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-inject-rPJM8BGL" } ], "source": { "advisory": "cisco-sa-ios-xe-cmd-inject-rPJM8BGL", "defects": [ "CSCwn48408" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20334", "datePublished": "2025-09-24T17:07:19.311Z", "dateReserved": "2024-10-10T19:15:13.255Z", "dateUpdated": "2025-09-25T03:55:55.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20314 (GCVE-0-2025-20314)
Vulnerability from cvelistv5
Published
2025-09-24 17:53
Modified
2025-10-15 16:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-232 - Improper Handling of Undefined Values
Summary
A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to improper validation of software packages. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Because this vulnerability allows an attacker to bypass a major security feature of a device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: 17.3.1 Version: 17.3.2 Version: 17.3.3 Version: 17.3.1a Version: 17.3.1w Version: 17.3.2a Version: 17.3.1x Version: 17.3.1z Version: 17.3.4 Version: 17.3.5 Version: 17.3.4a Version: 17.3.6 Version: 17.3.4b Version: 17.3.4c Version: 17.3.5a Version: 17.3.5b Version: 17.3.7 Version: 17.3.8 Version: 17.3.8a Version: 17.4.1 Version: 17.4.2 Version: 17.4.1a Version: 17.4.1b Version: 17.4.2a Version: 17.5.1 Version: 17.5.1a Version: 17.6.1 Version: 17.6.2 Version: 17.6.1w Version: 17.6.1a Version: 17.6.1x Version: 17.6.3 Version: 17.6.1y Version: 17.6.1z Version: 17.6.3a Version: 17.6.4 Version: 17.6.1z1 Version: 17.6.5 Version: 17.6.6 Version: 17.6.6a Version: 17.6.5a Version: 17.6.7 Version: 17.6.8 Version: 17.6.8a Version: 17.7.1 Version: 17.7.1a Version: 17.7.1b Version: 17.7.2 Version: 17.10.1 Version: 17.10.1a Version: 17.10.1b Version: 17.8.1 Version: 17.8.1a Version: 17.9.1 Version: 17.9.1w Version: 17.9.2 Version: 17.9.1a Version: 17.9.1x Version: 17.9.1y Version: 17.9.3 Version: 17.9.2a Version: 17.9.1x1 Version: 17.9.3a Version: 17.9.4 Version: 17.9.1y1 Version: 17.9.5 Version: 17.9.4a Version: 17.9.5a Version: 17.9.5b Version: 17.9.6 Version: 17.9.6a Version: 17.9.7 Version: 17.9.5e Version: 17.9.5f Version: 17.9.7a Version: 17.9.7b Version: 17.11.1 Version: 17.11.1a Version: 17.12.1 Version: 17.12.1w Version: 17.12.1a Version: 17.12.1x Version: 17.12.2 Version: 17.12.3 Version: 17.12.2a Version: 17.12.1y Version: 17.12.1z Version: 17.12.4 Version: 17.12.3a Version: 17.12.1z1 Version: 17.12.1z2 Version: 17.12.4a Version: 17.12.5 Version: 17.12.4b Version: 17.12.1z3 Version: 17.12.5a Version: 17.12.1z4 Version: 17.12.5b Version: 17.12.5c Version: 17.13.1 Version: 17.13.1a Version: 17.14.1 Version: 17.14.1a Version: 17.15.1 Version: 17.15.1w Version: 17.15.1a Version: 17.15.2 Version: 17.15.1b Version: 17.15.1x Version: 17.15.3 Version: 17.15.2c Version: 17.15.2a Version: 17.15.1y Version: 17.15.2b Version: 17.15.3a Version: 17.15.3b Version: 17.16.1 Version: 17.16.1a Version: 17.17.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20314", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T03:56:03.601Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "17.3.1w" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.1x" }, { "status": "affected", "version": "17.3.1z" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.4.2a" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.1w" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "17.6.1x" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.1z" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.1z1" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.6.8a" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "17.7.1b" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1a" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.1w" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.9.1x" }, { "status": "affected", "version": "17.9.1y" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.9.1x1" }, { "status": "affected", "version": "17.9.3a" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.1y1" }, { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.9.5a" }, { "status": "affected", "version": "17.9.5b" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.9.7" }, { "status": "affected", "version": "17.9.5e" }, { "status": "affected", "version": "17.9.5f" }, { "status": "affected", "version": "17.9.7a" }, { "status": "affected", "version": "17.9.7b" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.1w" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.12.1x" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.2a" }, { "status": "affected", "version": "17.12.1y" }, { "status": "affected", "version": "17.12.1z" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.1z1" }, { "status": "affected", "version": "17.12.1z2" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.12.5" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.12.1z3" }, { "status": "affected", "version": "17.12.5a" }, { "status": "affected", "version": "17.12.1z4" }, { "status": "affected", "version": "17.12.5b" }, { "status": "affected", "version": "17.12.5c" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.13.1a" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.14.1a" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.1w" }, { "status": "affected", "version": "17.15.1a" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.1b" }, { "status": "affected", "version": "17.15.1x" }, { "status": "affected", "version": "17.15.3" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.1y" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.15.3a" }, { "status": "affected", "version": "17.15.3b" }, { "status": "affected", "version": "17.16.1" }, { "status": "affected", "version": "17.16.1a" }, { "status": "affected", "version": "17.17.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to improper validation of software packages. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Because this vulnerability allows an attacker to bypass a major security feature of a device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-232", "description": "Improper Handling of Undefined Values", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-15T16:25:42.709Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-secboot-UqFD8AvC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD8AvC" } ], "source": { "advisory": "cisco-sa-secboot-UqFD8AvC", "defects": [ "CSCwo38924" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20314", "datePublished": "2025-09-24T17:53:45.663Z", "dateReserved": "2024-10-10T19:15:13.253Z", "dateUpdated": "2025-10-15T16:25:42.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20327 (GCVE-0-2025-20327)
Vulnerability from cvelistv5
Published
2025-09-24 17:11
Modified
2025-09-24 18:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1287 - Improper Validation of Specified Type of Input
Summary
A vulnerability in the web UI of Cisco IOS Software could allow an authenticated, remote attacker with low privileges to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted URL in an HTTP request. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | IOS |
Version: 15.2(6)E2 Version: 15.2(7)E Version: 15.2(6)E2a Version: 15.2(6)E2b Version: 15.2(7)E1 Version: 15.2(7)E0a Version: 15.2(7)E0b Version: 15.2(7)E0s Version: 15.2(6)E3 Version: 15.2(7)E2 Version: 15.2(7a)E0b Version: 15.2(7)E3 Version: 15.2(7)E1a Version: 15.2(7b)E0b Version: 15.2(7)E2a Version: 15.2(7)E4 Version: 15.2(7)E3k Version: 15.2(8)E Version: 15.2(8)E1 Version: 15.2(7)E5 Version: 15.2(7)E6 Version: 15.2(8)E2 Version: 15.2(7)E7 Version: 15.2(8)E3 Version: 15.2(7)E8 Version: 15.2(8)E4 Version: 15.2(7)E9 Version: 15.2(8)E5 Version: 15.2(7)E10 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20327", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T18:08:55.351442Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-24T18:11:26.278Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "15.2(6)E2" }, { "status": "affected", "version": "15.2(7)E" }, { "status": "affected", "version": "15.2(6)E2a" }, { "status": "affected", "version": "15.2(6)E2b" }, { "status": "affected", "version": "15.2(7)E1" }, { "status": "affected", "version": "15.2(7)E0a" }, { "status": "affected", "version": "15.2(7)E0b" }, { "status": "affected", "version": "15.2(7)E0s" }, { "status": "affected", "version": "15.2(6)E3" }, { "status": "affected", "version": "15.2(7)E2" }, { "status": "affected", "version": "15.2(7a)E0b" }, { "status": "affected", "version": "15.2(7)E3" }, { "status": "affected", "version": "15.2(7)E1a" }, { "status": "affected", "version": "15.2(7b)E0b" }, { "status": "affected", "version": "15.2(7)E2a" }, { "status": "affected", "version": "15.2(7)E4" }, { "status": "affected", "version": "15.2(7)E3k" }, { "status": "affected", "version": "15.2(8)E" }, { "status": "affected", "version": "15.2(8)E1" }, { "status": "affected", "version": "15.2(7)E5" }, { "status": "affected", "version": "15.2(7)E6" }, { "status": "affected", "version": "15.2(8)E2" }, { "status": "affected", "version": "15.2(7)E7" }, { "status": "affected", "version": "15.2(8)E3" }, { "status": "affected", "version": "15.2(7)E8" }, { "status": "affected", "version": "15.2(8)E4" }, { "status": "affected", "version": "15.2(7)E9" }, { "status": "affected", "version": "15.2(8)E5" }, { "status": "affected", "version": "15.2(7)E10" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco IOS Software could allow an authenticated, remote attacker with low privileges to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted URL in an HTTP request. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1287", "description": "Improper Validation of Specified Type of Input", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-24T17:11:44.744Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ios-invalid-url-dos-Nvxszf6u", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-invalid-url-dos-Nvxszf6u" } ], "source": { "advisory": "cisco-sa-ios-invalid-url-dos-Nvxszf6u", "defects": [ "CSCwo34150" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20327", "datePublished": "2025-09-24T17:11:44.744Z", "dateReserved": "2024-10-10T19:15:13.254Z", "dateUpdated": "2025-09-24T18:11:26.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20160 (GCVE-0-2025-20160)
Vulnerability from cvelistv5
Published
2025-09-24 17:10
Modified
2025-10-01 16:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication.
This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Cisco | IOS |
Version: 15.2(6)E1 Version: 15.2(4)E6 Version: 15.2(6)E2 Version: 15.2(4)E7 Version: 15.2(7)E Version: 15.2(4)E8 Version: 15.2(6)E2a Version: 15.2(6)E2b Version: 15.2(7)E1 Version: 15.2(7)E0a Version: 15.2(7)E0b Version: 15.2(7)E0s Version: 15.2(6)E3 Version: 15.2(4)E9 Version: 15.2(7)E2 Version: 15.2(7a)E0b Version: 15.2(4)E10 Version: 15.2(7)E3 Version: 15.2(7)E1a Version: 15.2(7b)E0b Version: 15.2(7)E2a Version: 15.2(4)E10a Version: 15.2(7)E4 Version: 15.2(7)E3k Version: 15.2(8)E Version: 15.2(8)E1 Version: 15.2(7)E5 Version: 15.2(7)E6 Version: 15.2(8)E2 Version: 15.2(4)E10d Version: 15.2(7)E7 Version: 15.2(8)E3 Version: 15.2(7)E8 Version: 15.2(8)E4 Version: 15.2(7)E9 Version: 15.2(8)E5 Version: 15.2(8)E6 Version: 15.2(7)E10 Version: 15.2(7)E11 Version: 15.2(8)E7 Version: 15.2(7)E12 Version: 15.5(3)S8 Version: 15.5(3)S9 Version: 15.5(3)S10 Version: 15.5(3)S9a Version: 15.2(6)EB Version: 15.5(3)M7 Version: 15.5(3)M8 Version: 15.5(3)M9 Version: 15.5(3)M10 Version: 15.6(2)SP5 Version: 15.6(2)SP6 Version: 15.6(2)SP7 Version: 15.6(2)SP8 Version: 15.6(2)SP9 Version: 15.6(3)M4 Version: 15.6(3)M5 Version: 15.6(3)M6 Version: 15.6(3)M7 Version: 15.6(3)M6a Version: 15.6(3)M6b Version: 15.6(3)M8 Version: 15.6(3)M9 Version: 15.5(1)SY2 Version: 15.5(1)SY3 Version: 15.5(1)SY4 Version: 15.5(1)SY5 Version: 15.5(1)SY6 Version: 15.5(1)SY7 Version: 15.5(1)SY8 Version: 15.5(1)SY9 Version: 15.5(1)SY10 Version: 15.5(1)SY11 Version: 15.5(1)SY12 Version: 15.5(1)SY13 Version: 15.5(1)SY14 Version: 15.5(1)SY15 Version: 15.7(3)M3 Version: 15.7(3)M2 Version: 15.7(3)M4 Version: 15.7(3)M5 Version: 15.7(3)M4a Version: 15.7(3)M4b Version: 15.7(3)M6 Version: 15.7(3)M7 Version: 15.7(3)M8 Version: 15.7(3)M9 Version: 15.8(3)M Version: 15.8(3)M1 Version: 15.8(3)M0a Version: 15.8(3)M0b Version: 15.8(3)M2 Version: 15.8(3)M1a Version: 15.8(3)M3 Version: 15.8(3)M2a Version: 15.8(3)M4 Version: 15.8(3)M3a Version: 15.8(3)M3b Version: 15.8(3)M5 Version: 15.8(3)M6 Version: 15.8(3)M7 Version: 15.8(3)M8 Version: 15.8(3)M9 Version: 15.9(3)M Version: 15.9(3)M1 Version: 15.9(3)M0a Version: 15.9(3)M2 Version: 15.9(3)M3 Version: 15.9(3)M2a Version: 15.9(3)M3a Version: 15.9(3)M4 Version: 15.9(3)M3b Version: 15.9(3)M5 Version: 15.9(3)M4a Version: 15.9(3)M6 Version: 15.9(3)M7 Version: 15.9(3)M6a Version: 15.9(3)M6b Version: 15.9(3)M8 Version: 15.9(3)M7a Version: 15.9(3)M9 Version: 15.9(3)M8b Version: 15.9(3)M10 Version: 15.9(3)M11 |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T03:56:02.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "15.2(6)E1" }, { "status": "affected", "version": "15.2(4)E6" }, { "status": "affected", "version": "15.2(6)E2" }, { "status": "affected", "version": "15.2(4)E7" }, { "status": "affected", "version": "15.2(7)E" }, { "status": "affected", "version": "15.2(4)E8" }, { "status": "affected", "version": "15.2(6)E2a" }, { "status": "affected", "version": "15.2(6)E2b" }, { "status": "affected", "version": "15.2(7)E1" }, { "status": "affected", "version": "15.2(7)E0a" }, { "status": "affected", "version": "15.2(7)E0b" }, { "status": "affected", "version": "15.2(7)E0s" }, { "status": "affected", "version": "15.2(6)E3" }, { "status": "affected", "version": "15.2(4)E9" }, { "status": "affected", "version": "15.2(7)E2" }, { "status": "affected", "version": "15.2(7a)E0b" }, { "status": "affected", "version": "15.2(4)E10" }, { "status": "affected", "version": "15.2(7)E3" }, { "status": "affected", "version": "15.2(7)E1a" }, { "status": "affected", "version": "15.2(7b)E0b" }, { "status": "affected", "version": "15.2(7)E2a" }, { "status": "affected", "version": "15.2(4)E10a" }, { "status": "affected", "version": "15.2(7)E4" }, { "status": "affected", "version": "15.2(7)E3k" }, { "status": "affected", "version": "15.2(8)E" }, { "status": "affected", "version": "15.2(8)E1" }, { "status": "affected", "version": "15.2(7)E5" }, { "status": "affected", "version": "15.2(7)E6" }, { "status": "affected", "version": "15.2(8)E2" }, { "status": "affected", "version": "15.2(4)E10d" }, { "status": "affected", "version": "15.2(7)E7" }, { "status": "affected", "version": "15.2(8)E3" }, { "status": "affected", "version": "15.2(7)E8" }, { "status": "affected", "version": "15.2(8)E4" }, { "status": "affected", "version": "15.2(7)E9" }, { "status": "affected", "version": "15.2(8)E5" }, { "status": "affected", "version": "15.2(8)E6" }, { "status": "affected", "version": "15.2(7)E10" }, { "status": "affected", "version": "15.2(7)E11" }, { "status": "affected", "version": "15.2(8)E7" }, { "status": "affected", "version": "15.2(7)E12" }, { "status": "affected", "version": "15.5(3)S8" }, { "status": "affected", "version": "15.5(3)S9" }, { "status": "affected", "version": "15.5(3)S10" }, { "status": "affected", "version": "15.5(3)S9a" }, { "status": "affected", "version": "15.2(6)EB" }, { "status": "affected", "version": "15.5(3)M7" }, { "status": "affected", "version": "15.5(3)M8" }, { "status": "affected", "version": "15.5(3)M9" }, { "status": "affected", "version": "15.5(3)M10" }, { "status": "affected", "version": "15.6(2)SP5" }, { "status": "affected", "version": "15.6(2)SP6" }, { "status": "affected", "version": "15.6(2)SP7" }, { "status": "affected", "version": "15.6(2)SP8" }, { "status": "affected", "version": "15.6(2)SP9" }, { "status": "affected", "version": "15.6(3)M4" }, { "status": "affected", "version": "15.6(3)M5" }, { "status": "affected", "version": "15.6(3)M6" }, { "status": "affected", "version": "15.6(3)M7" }, { "status": "affected", "version": "15.6(3)M6a" }, { "status": "affected", "version": "15.6(3)M6b" }, { "status": "affected", "version": "15.6(3)M8" }, { "status": "affected", "version": "15.6(3)M9" }, { "status": "affected", "version": "15.5(1)SY2" }, { "status": "affected", "version": "15.5(1)SY3" }, { "status": "affected", "version": "15.5(1)SY4" }, { "status": "affected", "version": "15.5(1)SY5" }, { "status": "affected", "version": "15.5(1)SY6" }, { "status": "affected", "version": "15.5(1)SY7" }, { "status": "affected", "version": "15.5(1)SY8" }, { "status": "affected", "version": "15.5(1)SY9" }, { "status": "affected", "version": "15.5(1)SY10" }, { "status": "affected", "version": "15.5(1)SY11" }, { "status": "affected", "version": "15.5(1)SY12" }, { "status": "affected", "version": "15.5(1)SY13" }, { "status": "affected", "version": "15.5(1)SY14" }, { "status": "affected", "version": "15.5(1)SY15" }, { "status": "affected", "version": "15.7(3)M3" }, { "status": "affected", "version": "15.7(3)M2" }, { "status": "affected", "version": "15.7(3)M4" }, { "status": "affected", "version": "15.7(3)M5" }, { "status": "affected", "version": "15.7(3)M4a" }, { "status": "affected", "version": "15.7(3)M4b" }, { "status": "affected", "version": "15.7(3)M6" }, { "status": "affected", "version": "15.7(3)M7" }, { "status": "affected", "version": "15.7(3)M8" }, { "status": "affected", "version": "15.7(3)M9" }, { "status": "affected", "version": "15.8(3)M" }, { "status": "affected", "version": "15.8(3)M1" }, { "status": "affected", "version": "15.8(3)M0a" }, { "status": "affected", "version": "15.8(3)M0b" }, { "status": "affected", "version": "15.8(3)M2" }, { "status": "affected", "version": "15.8(3)M1a" }, { "status": "affected", "version": "15.8(3)M3" }, { "status": "affected", "version": "15.8(3)M2a" }, { "status": "affected", "version": "15.8(3)M4" }, { "status": "affected", "version": "15.8(3)M3a" }, { "status": "affected", "version": "15.8(3)M3b" }, { "status": "affected", "version": "15.8(3)M5" }, { "status": "affected", "version": "15.8(3)M6" }, { "status": "affected", "version": "15.8(3)M7" }, { "status": "affected", "version": "15.8(3)M8" }, { "status": "affected", "version": "15.8(3)M9" }, { "status": "affected", "version": "15.9(3)M" }, { "status": "affected", "version": "15.9(3)M1" }, { "status": "affected", "version": "15.9(3)M0a" }, { "status": "affected", "version": "15.9(3)M2" }, { "status": "affected", "version": "15.9(3)M3" }, { "status": "affected", "version": "15.9(3)M2a" }, { "status": "affected", "version": "15.9(3)M3a" }, { "status": "affected", "version": "15.9(3)M4" }, { "status": "affected", "version": "15.9(3)M3b" }, { "status": "affected", "version": "15.9(3)M5" }, { "status": "affected", "version": "15.9(3)M4a" }, { "status": "affected", "version": "15.9(3)M6" }, { "status": "affected", "version": "15.9(3)M7" }, { "status": "affected", "version": "15.9(3)M6a" }, { "status": "affected", "version": "15.9(3)M6b" }, { "status": "affected", "version": "15.9(3)M8" }, { "status": "affected", "version": "15.9(3)M7a" }, { "status": "affected", "version": "15.9(3)M9" }, { "status": "affected", "version": "15.9(3)M8b" }, { "status": "affected", "version": "15.9(3)M10" }, { "status": "affected", "version": "15.9(3)M11" } ] }, { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.16.8S" }, { "status": "affected", "version": "3.16.9S" }, { "status": "affected", "version": "3.16.10S" }, { "status": "affected", "version": "3.8.6E" }, { "status": "affected", "version": "3.8.7E" }, { "status": "affected", "version": "3.8.8E" }, { "status": "affected", "version": "3.8.9E" }, { "status": "affected", "version": "3.8.10E" }, { "status": "affected", "version": "3.18.5SP" }, { "status": "affected", "version": "3.18.6SP" }, { "status": "affected", "version": "3.18.7SP" }, { "status": "affected", "version": "3.18.8aSP" }, { "status": "affected", "version": "3.18.9SP" }, { "status": "affected", "version": "16.6.5" }, { "status": "affected", "version": "16.6.5a" }, { "status": "affected", "version": "16.6.6" }, { "status": "affected", "version": "16.6.7" }, { "status": "affected", "version": "16.6.8" }, { "status": "affected", "version": "16.6.9" }, { "status": "affected", "version": "16.6.10" }, { "status": "affected", "version": "16.8.1" }, { "status": "affected", "version": "16.8.1a" }, { "status": "affected", "version": "16.8.1b" }, { "status": "affected", "version": "16.8.1s" }, { "status": "affected", "version": "16.8.1c" }, { "status": "affected", "version": "16.8.1d" }, { "status": "affected", "version": "16.8.2" }, { "status": "affected", "version": "16.8.1e" }, { "status": "affected", "version": "16.8.3" }, { "status": "affected", "version": "16.9.1" }, { "status": "affected", "version": "16.9.2" }, { "status": "affected", "version": "16.9.1a" }, { "status": "affected", "version": "16.9.1b" }, { "status": "affected", "version": "16.9.1s" }, { "status": "affected", "version": "16.9.3" }, { "status": "affected", "version": "16.9.4" }, { "status": "affected", "version": "16.9.3a" }, { "status": "affected", "version": "16.9.5" }, { "status": "affected", "version": "16.9.5f" }, { "status": "affected", "version": "16.9.6" }, { "status": "affected", "version": "16.9.7" }, { "status": "affected", "version": "16.9.8" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "16.10.1a" }, { "status": "affected", "version": "16.10.1b" }, { "status": "affected", "version": "16.10.1s" }, { "status": "affected", "version": "16.10.1c" }, { "status": "affected", "version": "16.10.1e" }, { "status": "affected", "version": "16.10.1d" }, { "status": "affected", "version": "16.10.2" }, { "status": "affected", "version": "16.10.1f" }, { "status": "affected", "version": "16.10.1g" }, { "status": "affected", "version": "16.10.3" }, { "status": "affected", "version": "3.10.1E" }, { "status": "affected", "version": "3.10.2E" }, { "status": "affected", "version": "3.10.3E" }, { "status": "affected", "version": "16.11.1" }, { "status": "affected", "version": "16.11.1a" }, { "status": "affected", "version": "16.11.1b" }, { "status": "affected", "version": "16.11.2" }, { "status": "affected", "version": "16.11.1s" }, { "status": "affected", "version": "16.12.1" }, { "status": "affected", "version": "16.12.1s" }, { "status": "affected", "version": "16.12.1a" }, { "status": "affected", "version": "16.12.1c" }, { "status": "affected", "version": "16.12.1w" }, { "status": "affected", "version": "16.12.2" }, { "status": "affected", "version": "16.12.1y" }, { "status": "affected", "version": "16.12.2a" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "16.12.2s" }, { "status": "affected", "version": "16.12.1x" }, { "status": "affected", "version": "16.12.1t" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.3s" }, { "status": "affected", "version": "16.12.3a" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "16.12.1z1" }, { "status": "affected", "version": "16.12.5a" }, { "status": "affected", "version": "16.12.5b" }, { "status": "affected", "version": "16.12.1z2" }, { "status": "affected", "version": "16.12.6a" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "16.12.9" }, { "status": "affected", "version": "16.12.10" }, { "status": "affected", "version": "16.12.10a" }, { "status": "affected", "version": "16.12.11" }, { "status": "affected", "version": "16.12.12" }, { "status": "affected", "version": "16.12.13" }, { "status": "affected", "version": "3.11.0E" }, { "status": "affected", "version": "3.11.1E" }, { "status": "affected", "version": "3.11.2E" }, { "status": "affected", "version": "3.11.3E" }, { "status": "affected", "version": "3.11.1aE" }, { "status": "affected", "version": "3.11.4E" }, { "status": "affected", "version": "3.11.3aE" }, { "status": "affected", "version": "3.11.5E" }, { "status": "affected", "version": "3.11.6E" }, { "status": "affected", "version": "3.11.7E" }, { "status": "affected", "version": "3.11.8E" }, { "status": "affected", "version": "3.11.9E" }, { "status": "affected", "version": "3.11.10E" }, { "status": "affected", "version": "3.11.11E" }, { "status": "affected", "version": "3.11.12E" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "17.1.1a" }, { "status": "affected", "version": "17.1.1s" }, { "status": "affected", "version": "17.1.1t" }, { "status": "affected", "version": "17.1.3" }, { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1r" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.2.1v" }, { "status": "affected", "version": "17.2.2" }, { "status": "affected", "version": "17.2.3" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "17.3.1w" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.1x" }, { "status": "affected", "version": "17.3.1z" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.4.2a" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.1w" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "17.6.1x" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.1z" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.1z1" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.6.8a" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "17.7.1b" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1a" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.1w" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.9.1x" }, { "status": "affected", "version": "17.9.1y" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.9.1x1" }, { "status": "affected", "version": "17.9.3a" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.1y1" }, { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.9.5a" }, { "status": "affected", "version": "17.9.5b" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.9.7" }, { "status": "affected", "version": "17.9.5e" }, { "status": "affected", "version": "17.9.5f" }, { "status": "affected", "version": "17.9.7a" }, { "status": "affected", "version": "17.9.7b" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.1w" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.12.1x" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.2a" }, { "status": "affected", "version": "17.12.1y" }, { "status": "affected", "version": "17.12.1z" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.1z1" }, { "status": "affected", "version": "17.12.1z2" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.12.5" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.12.1z3" }, { "status": "affected", "version": "17.12.5a" }, { "status": "affected", "version": "17.12.1z4" }, { "status": "affected", "version": "17.12.5b" }, { "status": "affected", "version": "17.12.5c" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.13.1a" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.14.1a" }, { "status": "affected", "version": "17.11.99SW" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.1w" }, { "status": "affected", "version": "17.15.1a" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.1b" }, { "status": "affected", "version": "17.15.1x" }, { "status": "affected", "version": "17.15.3" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.1y" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.15.3a" }, { "status": "affected", "version": "17.15.3b" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication. \r\n\r This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "Improper Authentication", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-01T16:49:08.602Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ios-tacacs-hdB7thJw", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-hdB7thJw" } ], "source": { "advisory": "cisco-sa-ios-tacacs-hdB7thJw", "defects": [ "CSCwm99306" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20160", "datePublished": "2025-09-24T17:10:22.652Z", "dateReserved": "2024-10-10T19:15:13.217Z", "dateUpdated": "2025-10-01T16:49:08.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20315 (GCVE-0-2025-20315)
Vulnerability from cvelistv5
Published
2025-09-24 17:09
Modified
2025-09-24 18:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-805 - Buffer Access with Incorrect Length Value
Summary
A vulnerability in the Network-Based Application Recognition (NBAR) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, causing a denial of service (DoS) condition.
This vulnerability is due to improper handling of malformed Control and Provisioning of Wireless Access Points (CAPWAP) packets. An attacker could exploit this vulnerability by sending malformed CAPWAP packets through an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: 3.7.0S Version: 3.7.1S Version: 3.7.2S Version: 3.7.3S Version: 3.7.4S Version: 3.7.5S Version: 3.7.6S Version: 3.7.7S Version: 3.7.4aS Version: 3.7.2tS Version: 3.7.0bS Version: 3.7.1aS Version: 3.8.0S Version: 3.8.1S Version: 3.8.2S Version: 3.9.1S Version: 3.9.0S Version: 3.9.2S Version: 3.9.1aS Version: 3.9.0aS Version: 3.11.1S Version: 3.11.2S Version: 3.11.0S Version: 3.11.3S Version: 3.11.4S Version: 3.12.0S Version: 3.12.1S Version: 3.12.2S Version: 3.12.3S Version: 3.12.0aS Version: 3.12.4S Version: 3.13.0S Version: 3.13.1S Version: 3.13.2S Version: 3.13.3S Version: 3.13.4S Version: 3.13.5S Version: 3.13.2aS Version: 3.13.0aS Version: 3.13.5aS Version: 3.13.6S Version: 3.13.7S Version: 3.13.6aS Version: 3.13.7aS Version: 3.13.8S Version: 3.13.9S Version: 3.13.10S Version: 3.14.0S Version: 3.14.1S Version: 3.14.2S Version: 3.14.3S Version: 3.14.4S Version: 3.15.0S Version: 3.15.1S Version: 3.15.2S Version: 3.15.1cS Version: 3.15.3S Version: 3.15.4S Version: 3.16.0S Version: 3.16.1S Version: 3.16.1aS Version: 3.16.2S Version: 3.16.2aS Version: 3.16.0cS Version: 3.16.3S Version: 3.16.2bS Version: 3.16.3aS Version: 3.16.4S Version: 3.16.4aS Version: 3.16.4bS Version: 3.16.5S Version: 3.16.4dS Version: 3.16.6S Version: 3.16.7S Version: 3.16.6bS Version: 3.16.7aS Version: 3.16.7bS Version: 3.16.8S Version: 3.16.9S Version: 3.16.10S Version: 3.17.0S Version: 3.17.1S Version: 3.17.2S Version: 3.17.1aS Version: 3.17.3S Version: 3.17.4S Version: 16.1.1 Version: 16.1.2 Version: 16.1.3 Version: 16.2.1 Version: 16.2.2 Version: 16.3.1 Version: 16.3.2 Version: 16.3.3 Version: 16.3.1a Version: 16.3.4 Version: 16.3.5 Version: 16.3.5b Version: 16.3.6 Version: 16.3.7 Version: 16.3.8 Version: 16.3.9 Version: 16.3.10 Version: 16.3.11 Version: 16.4.1 Version: 16.4.2 Version: 16.4.3 Version: 16.5.1 Version: 16.5.1a Version: 16.5.1b Version: 16.5.2 Version: 16.5.3 Version: 3.18.0aS Version: 3.18.0S Version: 3.18.1S Version: 3.18.2S Version: 3.18.3S Version: 3.18.4S Version: 3.18.0SP Version: 3.18.1SP Version: 3.18.1aSP Version: 3.18.1bSP Version: 3.18.1cSP Version: 3.18.2SP Version: 3.18.2aSP Version: 3.18.3SP Version: 3.18.4SP Version: 3.18.3aSP Version: 3.18.3bSP Version: 3.18.5SP Version: 3.18.6SP Version: 3.18.7SP Version: 3.18.8aSP Version: 3.18.9SP Version: 16.6.1 Version: 16.6.2 Version: 16.6.3 Version: 16.6.4 Version: 16.6.5 Version: 16.6.4a Version: 16.6.5a Version: 16.6.6 Version: 16.6.7 Version: 16.6.8 Version: 16.6.9 Version: 16.6.10 Version: 16.7.1 Version: 16.7.1a Version: 16.7.1b Version: 16.7.2 Version: 16.7.3 Version: 16.7.4 Version: 16.8.1 Version: 16.8.1a Version: 16.8.1b Version: 16.8.1s Version: 16.8.1c Version: 16.8.1d Version: 16.8.2 Version: 16.8.1e Version: 16.8.3 Version: 16.9.1 Version: 16.9.2 Version: 16.9.1a Version: 16.9.1b Version: 16.9.1s Version: 16.9.3 Version: 16.9.4 Version: 16.9.3a Version: 16.9.5 Version: 16.9.5f Version: 16.9.6 Version: 16.9.7 Version: 16.9.8 Version: 16.10.1 Version: 16.10.1a Version: 16.10.1b Version: 16.10.1s Version: 16.10.1c Version: 16.10.1e Version: 16.10.1d Version: 16.10.2 Version: 16.10.1f Version: 16.10.1g Version: 16.10.3 Version: 16.11.1 Version: 16.11.1a Version: 16.11.1b Version: 16.11.2 Version: 16.11.1s Version: 16.12.1 Version: 16.12.1s Version: 16.12.1a Version: 16.12.1c Version: 16.12.1w Version: 16.12.2 Version: 16.12.1y Version: 16.12.2a Version: 16.12.3 Version: 16.12.8 Version: 16.12.2s Version: 16.12.1x Version: 16.12.1t Version: 16.12.4 Version: 16.12.3s Version: 16.12.3a Version: 16.12.4a Version: 16.12.5 Version: 16.12.6 Version: 16.12.1z1 Version: 16.12.5a Version: 16.12.5b Version: 16.12.1z2 Version: 16.12.6a Version: 16.12.7 Version: 16.12.9 Version: 16.12.10 Version: 16.12.10a Version: 16.12.11 Version: 16.12.12 Version: 16.12.13 Version: 17.1.1 Version: 17.1.1a Version: 17.1.1s Version: 17.1.1t Version: 17.1.3 Version: 17.2.1 Version: 17.2.1r Version: 17.2.1a Version: 17.2.1v Version: 17.2.2 Version: 17.2.3 Version: 17.3.1 Version: 17.3.2 Version: 17.3.3 Version: 17.3.1a Version: 17.3.1w Version: 17.3.2a Version: 17.3.1x Version: 17.3.1z Version: 17.3.4 Version: 17.3.5 Version: 17.3.4a Version: 17.3.6 Version: 17.3.4b Version: 17.3.4c Version: 17.3.5a Version: 17.3.5b Version: 17.3.7 Version: 17.3.8 Version: 17.3.8a Version: 17.4.1 Version: 17.4.2 Version: 17.4.1a Version: 17.4.1b Version: 17.4.2a Version: 17.5.1 Version: 17.5.1a Version: 17.6.1 Version: 17.6.2 Version: 17.6.1w Version: 17.6.1a Version: 17.6.1x Version: 17.6.3 Version: 17.6.1y Version: 17.6.1z Version: 17.6.3a Version: 17.6.4 Version: 17.6.1z1 Version: 17.6.5 Version: 17.6.6 Version: 17.6.6a Version: 17.6.5a Version: 17.6.7 Version: 17.6.8 Version: 17.6.8a Version: 17.7.1 Version: 17.7.1a Version: 17.7.1b Version: 17.7.2 Version: 17.10.1 Version: 17.10.1a Version: 17.10.1b Version: 17.8.1 Version: 17.8.1a Version: 17.9.1 Version: 17.9.1w Version: 17.9.2 Version: 17.9.1a Version: 17.9.1x Version: 17.9.1y Version: 17.9.3 Version: 17.9.2a Version: 17.9.1x1 Version: 17.9.3a Version: 17.9.4 Version: 17.9.1y1 Version: 17.9.5 Version: 17.9.4a Version: 17.9.5a Version: 17.9.5b Version: 17.9.6 Version: 17.9.6a Version: 17.9.5e Version: 17.9.5f Version: 17.11.1 Version: 17.11.1a Version: 17.12.1 Version: 17.12.1w Version: 17.12.1a Version: 17.12.1x Version: 17.12.2 Version: 17.12.3 Version: 17.12.2a Version: 17.12.1y Version: 17.12.1z Version: 17.12.4 Version: 17.12.3a Version: 17.12.1z1 Version: 17.12.1z2 Version: 17.12.4a Version: 17.12.4b Version: 17.12.1z3 Version: 17.13.1 Version: 17.13.1a Version: 17.14.1 Version: 17.14.1a Version: 17.11.99SW Version: 17.15.1 Version: 17.15.1w Version: 17.15.1a Version: 17.15.2 Version: 17.15.1b Version: 17.15.1x Version: 17.15.1z Version: 17.15.2c Version: 17.15.2a Version: 17.15.2b Version: 17.16.1 Version: 17.16.1a |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20315", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T18:21:40.690332Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-24T18:22:31.831Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.7.0S" }, { "status": "affected", "version": "3.7.1S" }, { "status": "affected", "version": "3.7.2S" }, { "status": "affected", "version": "3.7.3S" }, { "status": "affected", "version": "3.7.4S" }, { "status": "affected", "version": "3.7.5S" }, { "status": "affected", "version": "3.7.6S" }, { "status": "affected", "version": "3.7.7S" }, { "status": "affected", "version": "3.7.4aS" }, { "status": "affected", "version": "3.7.2tS" }, { "status": "affected", "version": "3.7.0bS" }, { "status": "affected", "version": "3.7.1aS" }, { "status": "affected", "version": "3.8.0S" }, { "status": "affected", "version": "3.8.1S" }, { "status": "affected", "version": "3.8.2S" }, { "status": "affected", "version": "3.9.1S" }, { "status": "affected", "version": "3.9.0S" }, { "status": "affected", "version": "3.9.2S" }, { "status": "affected", "version": "3.9.1aS" }, { "status": "affected", "version": "3.9.0aS" }, { "status": "affected", "version": "3.11.1S" }, { "status": "affected", "version": "3.11.2S" }, { "status": "affected", "version": "3.11.0S" }, { "status": "affected", "version": "3.11.3S" }, { "status": "affected", "version": "3.11.4S" }, { "status": "affected", "version": "3.12.0S" }, { "status": "affected", "version": "3.12.1S" }, { "status": "affected", "version": "3.12.2S" }, { "status": "affected", "version": "3.12.3S" }, { "status": "affected", "version": "3.12.0aS" }, { "status": "affected", "version": "3.12.4S" }, { "status": "affected", "version": "3.13.0S" }, { "status": "affected", "version": "3.13.1S" }, { "status": "affected", "version": "3.13.2S" }, { "status": "affected", "version": "3.13.3S" }, { "status": "affected", "version": "3.13.4S" }, { "status": "affected", "version": "3.13.5S" }, { "status": "affected", "version": "3.13.2aS" }, { "status": "affected", "version": "3.13.0aS" }, { "status": "affected", "version": "3.13.5aS" }, { "status": "affected", "version": "3.13.6S" }, { "status": "affected", "version": "3.13.7S" }, { "status": "affected", "version": "3.13.6aS" }, { "status": "affected", "version": "3.13.7aS" }, { "status": "affected", "version": "3.13.8S" }, { "status": "affected", "version": "3.13.9S" }, { "status": "affected", "version": "3.13.10S" }, { "status": "affected", "version": "3.14.0S" }, { "status": "affected", "version": "3.14.1S" }, { "status": "affected", "version": "3.14.2S" }, { "status": "affected", "version": "3.14.3S" }, { "status": "affected", "version": "3.14.4S" }, { "status": "affected", "version": "3.15.0S" }, { "status": "affected", "version": "3.15.1S" }, { "status": "affected", "version": "3.15.2S" }, { "status": "affected", "version": "3.15.1cS" }, { "status": "affected", "version": "3.15.3S" }, { "status": "affected", "version": "3.15.4S" }, { "status": "affected", "version": "3.16.0S" }, { "status": "affected", "version": "3.16.1S" }, { "status": "affected", "version": "3.16.1aS" }, { "status": "affected", "version": "3.16.2S" }, { "status": "affected", "version": "3.16.2aS" }, { "status": "affected", "version": "3.16.0cS" }, { "status": "affected", "version": "3.16.3S" }, { "status": "affected", "version": "3.16.2bS" }, { "status": "affected", "version": "3.16.3aS" }, { "status": "affected", "version": "3.16.4S" }, { "status": "affected", "version": "3.16.4aS" }, { "status": "affected", "version": "3.16.4bS" }, { "status": "affected", "version": "3.16.5S" }, { "status": "affected", "version": "3.16.4dS" }, { "status": "affected", "version": "3.16.6S" }, { "status": "affected", "version": "3.16.7S" }, { "status": "affected", "version": "3.16.6bS" }, { "status": "affected", "version": "3.16.7aS" }, { "status": "affected", "version": "3.16.7bS" }, { "status": "affected", "version": "3.16.8S" }, { "status": "affected", "version": "3.16.9S" }, { "status": "affected", "version": "3.16.10S" }, { "status": "affected", "version": "3.17.0S" }, { "status": "affected", "version": "3.17.1S" }, { "status": "affected", "version": "3.17.2S" }, { "status": "affected", "version": "3.17.1aS" }, { "status": "affected", "version": "3.17.3S" }, { "status": "affected", "version": "3.17.4S" }, { "status": "affected", "version": "16.1.1" }, { "status": "affected", "version": "16.1.2" }, { "status": "affected", "version": "16.1.3" }, { "status": "affected", "version": "16.2.1" }, { "status": "affected", "version": "16.2.2" }, { "status": "affected", "version": "16.3.1" }, { "status": "affected", "version": "16.3.2" }, { "status": "affected", "version": "16.3.3" }, { "status": "affected", "version": "16.3.1a" }, { "status": "affected", "version": "16.3.4" }, { "status": "affected", "version": "16.3.5" }, { "status": "affected", "version": "16.3.5b" }, { "status": "affected", "version": "16.3.6" }, { "status": "affected", "version": "16.3.7" }, { "status": "affected", "version": "16.3.8" }, { "status": "affected", "version": "16.3.9" }, { "status": "affected", "version": "16.3.10" }, { "status": "affected", "version": "16.3.11" }, { "status": "affected", "version": "16.4.1" }, { "status": "affected", "version": "16.4.2" }, { "status": "affected", "version": "16.4.3" }, { "status": "affected", "version": "16.5.1" }, { "status": "affected", "version": "16.5.1a" }, { "status": "affected", "version": "16.5.1b" }, { "status": "affected", "version": "16.5.2" }, { "status": "affected", "version": "16.5.3" }, { "status": "affected", "version": "3.18.0aS" }, { "status": "affected", "version": "3.18.0S" }, { "status": "affected", "version": "3.18.1S" }, { "status": "affected", "version": "3.18.2S" }, { "status": "affected", "version": "3.18.3S" }, { "status": "affected", "version": "3.18.4S" }, { "status": "affected", "version": "3.18.0SP" }, { "status": "affected", "version": "3.18.1SP" }, { "status": "affected", "version": "3.18.1aSP" }, { "status": "affected", "version": "3.18.1bSP" }, { "status": "affected", "version": "3.18.1cSP" }, { "status": "affected", "version": "3.18.2SP" }, { "status": "affected", "version": "3.18.2aSP" }, { "status": "affected", "version": "3.18.3SP" }, { "status": "affected", "version": "3.18.4SP" }, { "status": "affected", "version": "3.18.3aSP" }, { "status": "affected", "version": "3.18.3bSP" }, { "status": "affected", "version": "3.18.5SP" }, { "status": "affected", "version": "3.18.6SP" }, { "status": "affected", "version": "3.18.7SP" }, { "status": "affected", "version": "3.18.8aSP" }, { "status": "affected", "version": "3.18.9SP" }, { "status": "affected", "version": "16.6.1" }, { "status": "affected", "version": "16.6.2" }, { "status": "affected", "version": "16.6.3" }, { "status": "affected", "version": "16.6.4" }, { "status": "affected", "version": "16.6.5" }, { "status": "affected", "version": "16.6.4a" }, { "status": "affected", "version": "16.6.5a" }, { "status": "affected", "version": "16.6.6" }, { "status": "affected", "version": "16.6.7" }, { "status": "affected", "version": "16.6.8" }, { "status": "affected", "version": "16.6.9" }, { "status": "affected", "version": "16.6.10" }, { "status": "affected", "version": "16.7.1" }, { "status": "affected", "version": "16.7.1a" }, { "status": "affected", "version": "16.7.1b" }, { "status": "affected", "version": "16.7.2" }, { "status": "affected", "version": "16.7.3" }, { "status": "affected", "version": "16.7.4" }, { "status": "affected", "version": "16.8.1" }, { "status": "affected", "version": "16.8.1a" }, { "status": "affected", "version": "16.8.1b" }, { "status": "affected", "version": "16.8.1s" }, { "status": "affected", "version": "16.8.1c" }, { "status": "affected", "version": "16.8.1d" }, { "status": "affected", "version": "16.8.2" }, { "status": "affected", "version": "16.8.1e" }, { "status": "affected", "version": "16.8.3" }, { "status": "affected", "version": "16.9.1" }, { "status": "affected", "version": "16.9.2" }, { "status": "affected", "version": "16.9.1a" }, { "status": "affected", "version": "16.9.1b" }, { "status": "affected", "version": "16.9.1s" }, { "status": "affected", "version": "16.9.3" }, { "status": "affected", "version": "16.9.4" }, { "status": "affected", "version": "16.9.3a" }, { "status": "affected", "version": "16.9.5" }, { "status": "affected", "version": "16.9.5f" }, { "status": "affected", "version": "16.9.6" }, { "status": "affected", "version": "16.9.7" }, { "status": "affected", "version": "16.9.8" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "16.10.1a" }, { "status": "affected", "version": "16.10.1b" }, { "status": "affected", "version": "16.10.1s" }, { "status": "affected", "version": "16.10.1c" }, { "status": "affected", "version": "16.10.1e" }, { "status": "affected", "version": "16.10.1d" }, { "status": "affected", "version": "16.10.2" }, { "status": "affected", "version": "16.10.1f" }, { "status": "affected", "version": "16.10.1g" }, { "status": "affected", "version": "16.10.3" }, { "status": "affected", "version": "16.11.1" }, { "status": "affected", "version": "16.11.1a" }, { "status": "affected", "version": "16.11.1b" }, { "status": "affected", "version": "16.11.2" }, { "status": "affected", "version": "16.11.1s" }, { "status": "affected", "version": "16.12.1" }, { "status": "affected", "version": "16.12.1s" }, { "status": "affected", "version": "16.12.1a" }, { "status": "affected", "version": "16.12.1c" }, { "status": "affected", "version": "16.12.1w" }, { "status": "affected", "version": "16.12.2" }, { "status": "affected", "version": "16.12.1y" }, { "status": "affected", "version": "16.12.2a" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "16.12.2s" }, { "status": "affected", "version": "16.12.1x" }, { "status": "affected", "version": "16.12.1t" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.3s" }, { "status": "affected", "version": "16.12.3a" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "16.12.1z1" }, { "status": "affected", "version": "16.12.5a" }, { "status": "affected", "version": "16.12.5b" }, { "status": "affected", "version": "16.12.1z2" }, { "status": "affected", "version": "16.12.6a" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "16.12.9" }, { "status": "affected", "version": "16.12.10" }, { "status": "affected", "version": "16.12.10a" }, { "status": "affected", "version": "16.12.11" }, { "status": "affected", "version": "16.12.12" }, { "status": "affected", "version": "16.12.13" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "17.1.1a" }, { "status": "affected", "version": "17.1.1s" }, { "status": "affected", "version": "17.1.1t" }, { "status": "affected", "version": "17.1.3" }, { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1r" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.2.1v" }, { "status": "affected", "version": "17.2.2" }, { "status": "affected", "version": "17.2.3" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "17.3.1w" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.1x" }, { "status": "affected", "version": "17.3.1z" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.4.2a" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.1w" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "17.6.1x" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.1z" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.1z1" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.6.8a" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "17.7.1b" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1a" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.1w" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.9.1x" }, { "status": "affected", "version": "17.9.1y" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.9.1x1" }, { "status": "affected", "version": "17.9.3a" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.1y1" }, { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.9.5a" }, { "status": "affected", "version": "17.9.5b" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.9.5e" }, { "status": "affected", "version": "17.9.5f" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.1w" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.12.1x" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.2a" }, { "status": "affected", "version": "17.12.1y" }, { "status": "affected", "version": "17.12.1z" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.1z1" }, { "status": "affected", "version": "17.12.1z2" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.12.1z3" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.13.1a" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.14.1a" }, { "status": "affected", "version": "17.11.99SW" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.1w" }, { "status": "affected", "version": "17.15.1a" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.1b" }, { "status": "affected", "version": "17.15.1x" }, { "status": "affected", "version": "17.15.1z" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.16.1" }, { "status": "affected", "version": "17.16.1a" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Network-Based Application Recognition (NBAR) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, causing a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper handling of malformed Control and Provisioning of Wireless Access Points (CAPWAP) packets. An attacker could exploit this vulnerability by sending malformed CAPWAP packets through an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-805", "description": "Buffer Access with Incorrect Length Value", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-24T17:09:44.771Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-nbar-dos-LAvwTmeT", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nbar-dos-LAvwTmeT" } ], "source": { "advisory": "cisco-sa-nbar-dos-LAvwTmeT", "defects": [ "CSCwn46756" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20315", "datePublished": "2025-09-24T17:09:44.771Z", "dateReserved": "2024-10-10T19:15:13.253Z", "dateUpdated": "2025-09-24T18:22:31.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20352 (GCVE-0-2025-20352)
Vulnerability from cvelistv5
Published
2025-09-24 17:10
Modified
2025-09-30 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:
An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials.
An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device.
An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks.
This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.
Note: This vulnerability affects all versions of SNMP.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cisco | IOS |
Version: 12.2(55)SE Version: 12.2(55)SE3 Version: 12.2(55)SE2 Version: 12.2(58)SE Version: 12.2(55)SE1 Version: 12.2(58)SE1 Version: 12.2(55)SE4 Version: 12.2(58)SE2 Version: 12.2(55)SE5 Version: 12.2(55)SE6 Version: 12.2(55)SE7 Version: 12.2(55)SE8 Version: 12.2(55)SE9 Version: 12.2(55)SE10 Version: 12.2(55)SE11 Version: 12.2(55)SE12 Version: 12.2(55)SE13 Version: 12.2(58)EZ Version: 12.2(53)EZ Version: 12.2(55)EZ Version: 12.2(60)EZ Version: 12.2(60)EZ1 Version: 12.2(60)EZ2 Version: 12.2(60)EZ3 Version: 12.2(60)EZ4 Version: 12.2(60)EZ5 Version: 12.2(60)EZ6 Version: 12.2(60)EZ7 Version: 12.2(60)EZ8 Version: 12.2(60)EZ9 Version: 12.2(60)EZ10 Version: 12.2(60)EZ11 Version: 12.2(60)EZ12 Version: 12.2(60)EZ13 Version: 12.2(60)EZ14 Version: 12.2(60)EZ15 Version: 12.2(33)SXI2 Version: 12.2(33)SXI3 Version: 12.2(33)SXI5 Version: 12.2(33)SXI4a Version: 12.2(33)SXI4 Version: 12.2(33)SXI2a Version: 12.2(33)SXI Version: 12.2(33)SXI6 Version: 12.2(33)SXI7 Version: 12.2(33)SXI1 Version: 12.2(33)SXI8 Version: 12.2(33)SXI9 Version: 12.2(33)SXI8a Version: 12.2(33)SXI10 Version: 12.2(33)SXI11 Version: 12.2(33)SXI12 Version: 12.2(33)SXI13 Version: 12.2(33)SXI14 Version: 12.2(50)SQ2 Version: 12.2(50)SQ1 Version: 12.2(50)SQ Version: 12.2(50)SQ3 Version: 12.2(50)SQ4 Version: 12.2(50)SQ5 Version: 12.2(50)SQ6 Version: 12.2(50)SQ7 Version: 15.3(1)T Version: 15.3(2)T Version: 15.3(1)T1 Version: 15.3(1)T2 Version: 15.3(1)T3 Version: 15.3(1)T4 Version: 15.3(2)T1 Version: 15.3(2)T2 Version: 15.3(2)T3 Version: 15.3(2)T4 Version: 15.0(1)EY Version: 15.0(1)EY1 Version: 15.0(1)EY2 Version: 15.0(2)EY Version: 15.0(2)EY1 Version: 15.0(2)EY2 Version: 15.0(2)EY3 Version: 15.0(1)SE Version: 15.0(2)SE Version: 15.0(1)SE1 Version: 15.0(1)SE2 Version: 15.0(1)SE3 Version: 15.0(2)SE1 Version: 15.0(2)SE2 Version: 15.0(2)SE3 Version: 15.0(2)SE4 Version: 15.0(2)SE5 Version: 15.0(2)SE6 Version: 15.0(2)SE7 Version: 15.0(2)SE8 Version: 15.0(2)SE9 Version: 15.0(2)SE10 Version: 15.0(2)SE11 Version: 15.0(2)SE10a Version: 15.0(2)SE12 Version: 15.0(2)SE13 Version: 15.0(1)SY Version: 15.0(1)SY1 Version: 15.0(1)SY2 Version: 15.0(1)SY3 Version: 15.0(1)SY4 Version: 15.0(1)SY5 Version: 15.0(1)SY6 Version: 15.0(1)SY7 Version: 15.0(1)SY8 Version: 15.0(1)SY7a Version: 15.0(1)SY9 Version: 15.0(1)SY10 Version: 12.2(33)SXJ Version: 12.2(33)SXJ1 Version: 12.2(33)SXJ2 Version: 12.2(33)SXJ3 Version: 12.2(33)SXJ4 Version: 12.2(33)SXJ5 Version: 12.2(33)SXJ6 Version: 12.2(33)SXJ7 Version: 12.2(33)SXJ8 Version: 12.2(33)SXJ9 Version: 12.2(33)SXJ10 Version: 15.1(1)SG Version: 15.1(2)SG Version: 15.1(1)SG1 Version: 15.1(1)SG2 Version: 15.1(2)SG1 Version: 15.1(2)SG2 Version: 15.1(2)SG3 Version: 15.1(2)SG4 Version: 15.1(2)SG5 Version: 15.1(2)SG6 Version: 15.1(2)SG7 Version: 15.1(2)SG8 Version: 15.2(4)M Version: 15.2(4)M1 Version: 15.2(4)M2 Version: 15.2(4)M4 Version: 15.2(4)M3 Version: 15.2(4)M5 Version: 15.2(4)M8 Version: 15.2(4)M10 Version: 15.2(4)M7 Version: 15.2(4)M6 Version: 15.2(4)M9 Version: 15.2(4)M6a Version: 15.2(4)M11 Version: 15.0(2)SG Version: 15.0(2)SG1 Version: 15.0(2)SG2 Version: 15.0(2)SG3 Version: 15.0(2)SG4 Version: 15.0(2)SG5 Version: 15.0(2)SG6 Version: 15.0(2)SG7 Version: 15.0(2)SG8 Version: 15.0(2)SG9 Version: 15.0(2)SG10 Version: 15.0(2)SG11 Version: 15.2(2)GC Version: 15.2(3)GC Version: 15.2(3)GC1 Version: 15.2(4)GC Version: 15.2(4)GC1 Version: 15.2(4)GC2 Version: 15.2(4)GC3 Version: 15.1(1)SY Version: 15.1(1)SY1 Version: 15.1(2)SY Version: 15.1(2)SY1 Version: 15.1(2)SY2 Version: 15.1(1)SY2 Version: 15.1(1)SY3 Version: 15.1(2)SY3 Version: 15.1(1)SY4 Version: 15.1(2)SY4 Version: 15.1(1)SY5 Version: 15.1(2)SY5 Version: 15.1(2)SY4a Version: 15.1(1)SY6 Version: 15.1(2)SY6 Version: 15.1(2)SY7 Version: 15.1(2)SY8 Version: 15.1(2)SY9 Version: 15.1(2)SY10 Version: 15.1(2)SY11 Version: 15.1(2)SY12 Version: 15.1(2)SY13 Version: 15.1(2)SY14 Version: 15.1(2)SY15 Version: 15.1(2)SY16 Version: 15.4(1)T Version: 15.4(2)T Version: 15.4(1)T2 Version: 15.4(1)T1 Version: 15.4(1)T3 Version: 15.4(2)T1 Version: 15.4(2)T3 Version: 15.4(2)T2 Version: 15.4(1)T4 Version: 15.4(2)T4 Version: 15.0(2)EA Version: 15.0(2)EA1 Version: 15.2(1)E Version: 15.2(2)E Version: 15.2(1)E1 Version: 15.2(3)E Version: 15.2(1)E2 Version: 15.2(1)E3 Version: 15.2(2)E1 Version: 15.2(4)E Version: 15.2(3)E1 Version: 15.2(2)E2 Version: 15.2(2a)E1 Version: 15.2(2)E3 Version: 15.2(2a)E2 Version: 15.2(3)E2 Version: 15.2(3a)E Version: 15.2(3)E3 Version: 15.2(4)E1 Version: 15.2(2)E4 Version: 15.2(2)E5 Version: 15.2(4)E2 Version: 15.2(3)E4 Version: 15.2(5)E Version: 15.2(4)E3 Version: 15.2(2)E6 Version: 15.2(5a)E Version: 15.2(5)E1 Version: 15.2(5b)E Version: 15.2(2)E5a Version: 15.2(5c)E Version: 15.2(2)E5b Version: 15.2(5a)E1 Version: 15.2(4)E4 Version: 15.2(2)E7 Version: 15.2(5)E2 Version: 15.2(6)E Version: 15.2(4)E5 Version: 15.2(5)E2c Version: 15.2(2)E8 Version: 15.2(6)E0a Version: 15.2(6)E1 Version: 15.2(6)E0c Version: 15.2(4)E6 Version: 15.2(6)E2 Version: 15.2(2)E9 Version: 15.2(4)E7 Version: 15.2(7)E Version: 15.2(2)E10 Version: 15.2(4)E8 Version: 15.2(6)E2a Version: 15.2(6)E2b Version: 15.2(7)E1 Version: 15.2(7)E0a Version: 15.2(7)E0b Version: 15.2(7)E0s Version: 15.2(6)E3 Version: 15.2(4)E9 Version: 15.2(7)E2 Version: 15.2(7a)E0b Version: 15.2(4)E10 Version: 15.2(7)E3 Version: 15.2(7)E1a Version: 15.2(7b)E0b Version: 15.2(7)E2a Version: 15.2(4)E10a Version: 15.2(7)E4 Version: 15.2(7)E3k Version: 15.2(8)E Version: 15.2(8)E1 Version: 15.2(7)E5 Version: 15.2(7)E6 Version: 15.2(8)E2 Version: 15.2(4)E10d Version: 15.2(7)E7 Version: 15.2(8)E3 Version: 15.2(7)E8 Version: 15.2(8)E4 Version: 15.2(7)E9 Version: 15.2(8)E5 Version: 15.2(8)E6 Version: 15.2(7)E10 Version: 15.2(7)E11 Version: 15.2(8)E7 Version: 15.2(7)E12 Version: 15.2(2)JB Version: 15.2(2)JB2 Version: 15.2(4)JB Version: 15.2(2)JB3 Version: 15.2(4)JB1 Version: 15.2(4)JB2 Version: 15.2(4)JB3 Version: 15.2(4)JB3a Version: 15.2(2)JB4 Version: 15.2(4)JB4 Version: 15.2(4)JB3h Version: 15.2(4)JB3b Version: 15.2(4)JB5 Version: 15.2(4)JB6 Version: 15.2(2)JB5 Version: 15.2(2)JB6 Version: 15.2(2)JAX Version: 15.3(3)M Version: 15.3(3)M1 Version: 15.3(3)M2 Version: 15.3(3)M3 Version: 15.3(3)M5 Version: 15.3(3)M4 Version: 15.3(3)M6 Version: 15.3(3)M7 Version: 15.3(3)M8 Version: 15.3(3)M9 Version: 15.3(3)M10 Version: 15.3(3)M8a Version: 15.2(4)JN Version: 15.2(1)EY Version: 15.0(2)EJ Version: 15.0(2)EJ1 Version: 15.2(1)SY Version: 15.2(1)SY1 Version: 15.2(1)SY0a Version: 15.2(1)SY2 Version: 15.2(2)SY Version: 15.2(1)SY1a Version: 15.2(2)SY1 Version: 15.2(2)SY2 Version: 15.2(1)SY3 Version: 15.2(1)SY4 Version: 15.2(2)SY3 Version: 15.2(1)SY5 Version: 15.2(1)SY6 Version: 15.2(1)SY7 Version: 15.2(1)SY8 Version: 15.2(5)EX Version: 15.0(2)EK Version: 15.0(2)EK1 Version: 15.4(1)CG Version: 15.4(1)CG1 Version: 15.4(2)CG Version: 15.5(1)S Version: 15.5(2)S Version: 15.5(1)S1 Version: 15.5(3)S Version: 15.5(1)S2 Version: 15.5(1)S3 Version: 15.5(2)S1 Version: 15.5(2)S2 Version: 15.5(3)S1 Version: 15.5(3)S1a Version: 15.5(2)S3 Version: 15.5(3)S2 Version: 15.5(3)S0a Version: 15.5(3)S3 Version: 15.5(1)S4 Version: 15.5(2)S4 Version: 15.5(3)S4 Version: 15.5(3)S5 Version: 15.5(3)S6 Version: 15.5(3)S6a Version: 15.5(3)S7 Version: 15.5(3)S6b Version: 15.5(3)S8 Version: 15.5(3)S9 Version: 15.5(3)S10 Version: 15.5(3)S9a Version: 15.5(1)T Version: 15.5(1)T1 Version: 15.5(2)T Version: 15.5(1)T2 Version: 15.5(1)T3 Version: 15.5(2)T1 Version: 15.5(2)T2 Version: 15.5(2)T3 Version: 15.5(2)T4 Version: 15.5(1)T4 Version: 15.2(2)EA Version: 15.2(2)EA1 Version: 15.2(2)EA2 Version: 15.2(3)EA Version: 15.2(4)EA Version: 15.2(4)EA1 Version: 15.2(2)EA3 Version: 15.2(4)EA3 Version: 15.2(5)EA Version: 15.2(4)EA4 Version: 15.2(4)EA5 Version: 15.2(4)EA6 Version: 15.2(4)EA7 Version: 15.2(4)EA8 Version: 15.2(4)EA9 Version: 15.2(4)EA9a Version: 15.3(3)JN3 Version: 15.3(3)JN4 Version: 15.3(3)JN7 Version: 15.3(3)JN8 Version: 15.3(3)JN9 Version: 15.5(3)M Version: 15.5(3)M1 Version: 15.5(3)M0a Version: 15.5(3)M2 Version: 15.5(3)M3 Version: 15.5(3)M4 Version: 15.5(3)M4a Version: 15.5(3)M5 Version: 15.5(3)M6 Version: 15.5(3)M7 Version: 15.5(3)M6a Version: 15.5(3)M8 Version: 15.5(3)M9 Version: 15.5(3)M10 Version: 15.3(3)JA1m Version: 15.3(3)JA1 Version: 15.3(3)JA4 Version: 15.3(3)JA5 Version: 15.3(3)JA6 Version: 15.3(3)JA7 Version: 15.3(3)JA8 Version: 15.3(3)JA10 Version: 15.3(3)JA11 Version: 15.3(3)JA12 Version: 15.3(3)JAA Version: 15.3(3)JAA11 Version: 15.3(3)JAA12 Version: 15.3(3)JAB Version: 15.3(3)JB Version: 15.5(3)SN Version: 15.0(2)SQD Version: 15.0(2)SQD1 Version: 15.0(2)SQD2 Version: 15.0(2)SQD3 Version: 15.0(2)SQD4 Version: 15.0(2)SQD5 Version: 15.0(2)SQD6 Version: 15.0(2)SQD7 Version: 15.0(2)SQD8 Version: 15.6(1)S Version: 15.6(2)S Version: 15.6(2)S1 Version: 15.6(1)S1 Version: 15.6(1)S2 Version: 15.6(2)S2 Version: 15.6(1)S3 Version: 15.6(2)S3 Version: 15.6(1)S4 Version: 15.6(2)S4 Version: 15.6(1)T Version: 15.6(2)T Version: 15.6(1)T0a Version: 15.6(1)T1 Version: 15.6(2)T1 Version: 15.6(1)T2 Version: 15.6(2)T2 Version: 15.6(1)T3 Version: 15.6(2)T3 Version: 15.3(3)JNB Version: 15.3(3)JNB1 Version: 15.3(3)JNB2 Version: 15.3(3)JNB3 Version: 15.3(3)JNB4 Version: 15.3(3)JNB6 Version: 15.3(3)JNB5 Version: 15.3(3)JAX Version: 15.3(3)JAX1 Version: 15.3(3)JAX2 Version: 15.3(3)JBB Version: 15.3(3)JBB1 Version: 15.3(3)JBB2 Version: 15.3(3)JBB4 Version: 15.3(3)JBB5 Version: 15.3(3)JBB6 Version: 15.3(3)JBB8 Version: 15.3(3)JBB6a Version: 15.3(3)JC Version: 15.3(3)JC1 Version: 15.3(3)JC2 Version: 15.3(3)JC3 Version: 15.3(3)JC4 Version: 15.3(3)JC5 Version: 15.3(3)JC6 Version: 15.3(3)JC8 Version: 15.3(3)JC9 Version: 15.3(3)JC14 Version: 15.3(1)SY Version: 15.3(1)SY1 Version: 15.3(1)SY2 Version: 15.3(3)JNC Version: 15.3(3)JNC1 Version: 15.3(3)JNC4 Version: 15.3(3)JNP Version: 15.3(3)JNP1 Version: 15.3(3)JNP3 Version: 15.6(2)SP Version: 15.6(2)SP1 Version: 15.6(2)SP2 Version: 15.6(2)SP3 Version: 15.6(2)SP4 Version: 15.6(2)SP5 Version: 15.6(2)SP6 Version: 15.6(2)SP7 Version: 15.6(2)SP8 Version: 15.6(2)SP9 Version: 15.6(2)SN Version: 15.3(3)JPB Version: 15.3(3)JPB1 Version: 15.3(3)JD Version: 15.3(3)JD2 Version: 15.3(3)JD3 Version: 15.3(3)JD4 Version: 15.3(3)JD5 Version: 15.3(3)JD6 Version: 15.3(3)JD7 Version: 15.3(3)JD8 Version: 15.3(3)JD9 Version: 15.3(3)JD11 Version: 15.3(3)JD13 Version: 15.3(3)JD14 Version: 15.3(3)JD16 Version: 15.3(3)JD17 Version: 15.6(3)M Version: 15.6(3)M1 Version: 15.6(3)M0a Version: 15.6(3)M1b Version: 15.6(3)M2 Version: 15.6(3)M2a Version: 15.6(3)M3 Version: 15.6(3)M3a Version: 15.6(3)M4 Version: 15.6(3)M5 Version: 15.6(3)M6 Version: 15.6(3)M7 Version: 15.6(3)M6a Version: 15.6(3)M6b Version: 15.6(3)M8 Version: 15.6(3)M9 Version: 15.2(4)EC1 Version: 15.2(4)EC2 Version: 15.3(3)JPC Version: 15.3(3)JPC1 Version: 15.3(3)JPC2 Version: 15.3(3)JPC3 Version: 15.3(3)JPC5 Version: 15.3(3)JND Version: 15.3(3)JND1 Version: 15.3(3)JND2 Version: 15.3(3)JND3 Version: 15.4(1)SY Version: 15.4(1)SY1 Version: 15.4(1)SY2 Version: 15.4(1)SY3 Version: 15.4(1)SY4 Version: 15.3(3)JE Version: 15.3(3)JPD Version: 15.3(3)JDA7 Version: 15.3(3)JDA8 Version: 15.3(3)JDA9 Version: 15.3(3)JDA11 Version: 15.3(3)JDA13 Version: 15.3(3)JDA14 Version: 15.3(3)JDA16 Version: 15.3(3)JDA17 Version: 15.5(1)SY Version: 15.5(1)SY1 Version: 15.5(1)SY2 Version: 15.5(1)SY3 Version: 15.5(1)SY4 Version: 15.5(1)SY5 Version: 15.5(1)SY6 Version: 15.5(1)SY7 Version: 15.5(1)SY8 Version: 15.5(1)SY9 Version: 15.5(1)SY10 Version: 15.5(1)SY11 Version: 15.5(1)SY12 Version: 15.5(1)SY13 Version: 15.5(1)SY14 Version: 15.5(1)SY15 Version: 15.3(3)JF Version: 15.3(3)JF1 Version: 15.3(3)JF2 Version: 15.3(3)JF4 Version: 15.3(3)JF5 Version: 15.3(3)JF6 Version: 15.3(3)JF7 Version: 15.3(3)JF8 Version: 15.3(3)JF9 Version: 15.3(3)JF10 Version: 15.3(3)JF11 Version: 15.3(3)JF12 Version: 15.3(3)JF12i Version: 15.3(3)JF14 Version: 15.3(3)JF14i Version: 15.3(3)JF15 Version: 15.3(3)JCA7 Version: 15.3(3)JCA8 Version: 15.3(3)JCA9 Version: 15.7(3)M Version: 15.7(3)M1 Version: 15.7(3)M0a Version: 15.7(3)M3 Version: 15.7(3)M2 Version: 15.7(3)M4 Version: 15.7(3)M5 Version: 15.7(3)M4a Version: 15.7(3)M4b Version: 15.7(3)M6 Version: 15.7(3)M7 Version: 15.7(3)M8 Version: 15.7(3)M9 Version: 15.3(3)JG Version: 15.3(3)JG1 Version: 15.3(3)JH Version: 15.3(3)JH1 Version: 15.3(3)JI1 Version: 15.3(3)JI3 Version: 15.3(3)JI4 Version: 15.3(3)JI5 Version: 15.3(3)JI6 Version: 15.8(3)M Version: 15.8(3)M1 Version: 15.8(3)M0a Version: 15.8(3)M0b Version: 15.8(3)M2 Version: 15.8(3)M1a Version: 15.8(3)M3 Version: 15.8(3)M2a Version: 15.8(3)M4 Version: 15.8(3)M3a Version: 15.8(3)M3b Version: 15.8(3)M5 Version: 15.8(3)M6 Version: 15.8(3)M7 Version: 15.8(3)M8 Version: 15.8(3)M9 Version: 15.9(3)M Version: 15.9(3)M1 Version: 15.9(3)M0a Version: 15.9(3)M2 Version: 15.9(3)M3 Version: 15.9(3)M2a Version: 15.9(3)M3a Version: 15.9(3)M4 Version: 15.9(3)M3b Version: 15.9(3)M5 Version: 15.9(3)M4a Version: 15.9(3)M6 Version: 15.9(3)M7 Version: 15.9(3)M6a Version: 15.9(3)M6b Version: 15.9(3)M8 Version: 15.9(3)M7a Version: 15.9(3)M9 Version: 15.9(3)M8b Version: 15.9(3)M10 Version: 15.9(3)M11 Version: 15.3(3)JK Version: 15.3(3)JK1 Version: 15.3(3)JK2 Version: 15.3(3)JK3 Version: 15.3(3)JK2a Version: 15.3(3)JK1t Version: 15.3(3)JK4 Version: 15.3(3)JK5 Version: 15.3(3)JK6 Version: 15.3(3)JK7 Version: 15.3(3)JK8 Version: 15.3(3)JK8a Version: 15.3(3)JK8b Version: 15.3(3)JK9 Version: 15.3(3)JK10 Version: 15.3(3)JK11 Version: 15.3(3)JJ Version: 15.3(3)JJ1 Version: 15.3(3)JPI1 Version: 15.3(3)JPI4 Version: 15.3(3)JPI1t Version: 15.3(3)JPI5 Version: 15.3(3)JPI7 Version: 15.3(3)JPI6a Version: 15.3(3)JPI8a Version: 15.3(3)JPI9 Version: 15.3(3)JPI10 Version: 15.3(3)JPJ2 Version: 15.3(3)JPJ3 Version: 15.3(3)JPJ2t Version: 15.3(3)JPJ3a Version: 15.3(3)JPJ4 Version: 15.3(3)JPJ5 Version: 15.3(3)JPJ6 Version: 15.3(3)JPJ7 Version: 15.3(3)JPJ7c Version: 15.3(3)JPJ8a Version: 15.3(3)JPJ9 Version: 15.3(3)JPJ10 Version: 15.3(3)JPJ11 Version: 15.3(3)JPK Version: 15.3(3)JPK1 Version: 15.3(3)JPK2 Version: 15.3(3)JPK3 Version: 15.3(3)JPK4 Version: 15.3(3)JPK5 Version: 15.3(3)JPK6 Version: 15.3(3)JPK7 Version: 15.3(3)JPK8 Version: 15.3(3)JPK9 Version: 15.3(3)JPL Version: 15.3(3)JPM Version: 15.3(3)JPN Version: 15.3(3)JPN1 Version: 15.3(3)JPN2 Version: 15.3(3)JPN3 Version: 15.3(3)JPN4 Version: 15.3(3)JPN5 Version: 15.3(3)JPN6 Version: 15.3(3)JPO Version: 15.3(3)JPP Version: 15.3(3)JPQ Version: 15.3(3)JPQ1 Version: 15.3(3)JPQ2 Version: 15.3(3)JPQ3 Version: 15.3(3)JPQ4 Version: 15.3(3)JPQ5 Version: 15.3(3)JPR Version: 15.3(3)JPS Version: 15.3(3)JPT Version: 15.3(3)JPT1 Version: 15.3(3)JPT2 |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20352", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-09-29", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-09-29T22:20:24.869Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-09-29T00:00:00+00:00", "value": "CVE-2025-20352 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.2(55)SE" }, { "status": "affected", "version": "12.2(55)SE3" }, { "status": "affected", "version": "12.2(55)SE2" }, { "status": "affected", "version": "12.2(58)SE" }, { "status": "affected", "version": "12.2(55)SE1" }, { "status": "affected", "version": "12.2(58)SE1" }, { "status": "affected", "version": "12.2(55)SE4" }, { "status": "affected", "version": "12.2(58)SE2" }, { "status": "affected", "version": "12.2(55)SE5" }, { "status": "affected", "version": "12.2(55)SE6" }, { "status": "affected", "version": "12.2(55)SE7" }, { "status": "affected", "version": "12.2(55)SE8" }, { "status": "affected", "version": "12.2(55)SE9" }, { "status": "affected", "version": "12.2(55)SE10" }, { "status": "affected", "version": "12.2(55)SE11" }, { "status": "affected", "version": "12.2(55)SE12" }, { "status": "affected", "version": "12.2(55)SE13" }, { "status": "affected", "version": "12.2(58)EZ" }, { "status": "affected", "version": "12.2(53)EZ" }, { "status": "affected", "version": "12.2(55)EZ" }, { "status": "affected", "version": "12.2(60)EZ" }, { "status": "affected", "version": "12.2(60)EZ1" }, { "status": "affected", "version": "12.2(60)EZ2" }, { "status": "affected", "version": "12.2(60)EZ3" }, { "status": "affected", "version": "12.2(60)EZ4" }, { "status": "affected", "version": "12.2(60)EZ5" }, { "status": "affected", "version": "12.2(60)EZ6" }, { "status": "affected", "version": "12.2(60)EZ7" }, { "status": "affected", "version": "12.2(60)EZ8" }, { "status": "affected", "version": "12.2(60)EZ9" }, { "status": "affected", "version": "12.2(60)EZ10" }, { "status": "affected", "version": "12.2(60)EZ11" }, { "status": "affected", "version": "12.2(60)EZ12" }, { "status": "affected", "version": "12.2(60)EZ13" }, { "status": "affected", "version": "12.2(60)EZ14" }, { "status": "affected", "version": "12.2(60)EZ15" }, { "status": "affected", "version": "12.2(33)SXI2" }, { "status": "affected", "version": "12.2(33)SXI3" }, { "status": "affected", "version": "12.2(33)SXI5" }, { "status": "affected", "version": "12.2(33)SXI4a" }, { "status": "affected", "version": "12.2(33)SXI4" }, { "status": "affected", "version": "12.2(33)SXI2a" }, { "status": "affected", "version": "12.2(33)SXI" }, { "status": "affected", "version": "12.2(33)SXI6" }, { "status": "affected", "version": "12.2(33)SXI7" }, { "status": "affected", "version": "12.2(33)SXI1" }, { "status": "affected", "version": "12.2(33)SXI8" }, { "status": "affected", "version": "12.2(33)SXI9" }, { "status": "affected", "version": "12.2(33)SXI8a" }, { "status": "affected", "version": "12.2(33)SXI10" }, { "status": "affected", "version": "12.2(33)SXI11" }, { "status": "affected", "version": "12.2(33)SXI12" }, { "status": "affected", "version": "12.2(33)SXI13" }, { "status": "affected", "version": "12.2(33)SXI14" }, { "status": "affected", "version": "12.2(50)SQ2" }, { "status": "affected", "version": "12.2(50)SQ1" }, { "status": "affected", "version": "12.2(50)SQ" }, { "status": "affected", "version": "12.2(50)SQ3" }, { "status": "affected", "version": "12.2(50)SQ4" }, { "status": "affected", "version": "12.2(50)SQ5" }, { "status": "affected", "version": "12.2(50)SQ6" }, { "status": "affected", "version": "12.2(50)SQ7" }, { "status": "affected", "version": "15.3(1)T" }, { "status": "affected", "version": "15.3(2)T" }, { "status": "affected", "version": "15.3(1)T1" }, { "status": "affected", "version": "15.3(1)T2" }, { "status": "affected", "version": "15.3(1)T3" }, { "status": "affected", "version": "15.3(1)T4" }, { "status": "affected", "version": "15.3(2)T1" }, { "status": "affected", "version": "15.3(2)T2" }, { "status": "affected", "version": "15.3(2)T3" }, { "status": "affected", "version": "15.3(2)T4" }, { "status": "affected", "version": "15.0(1)EY" }, { "status": "affected", "version": "15.0(1)EY1" }, { "status": "affected", "version": "15.0(1)EY2" }, { "status": "affected", "version": "15.0(2)EY" }, { "status": "affected", "version": "15.0(2)EY1" }, { "status": "affected", "version": "15.0(2)EY2" }, { "status": "affected", "version": "15.0(2)EY3" }, { "status": "affected", "version": "15.0(1)SE" }, { "status": "affected", "version": "15.0(2)SE" }, { "status": "affected", "version": "15.0(1)SE1" }, { "status": "affected", "version": "15.0(1)SE2" }, { "status": "affected", "version": "15.0(1)SE3" }, { "status": "affected", "version": "15.0(2)SE1" }, { "status": "affected", "version": "15.0(2)SE2" }, { "status": "affected", "version": "15.0(2)SE3" }, { "status": "affected", "version": "15.0(2)SE4" }, { "status": "affected", "version": "15.0(2)SE5" }, { "status": "affected", "version": "15.0(2)SE6" }, { "status": "affected", "version": "15.0(2)SE7" }, { "status": "affected", "version": "15.0(2)SE8" }, { "status": "affected", "version": "15.0(2)SE9" }, { "status": "affected", "version": "15.0(2)SE10" }, { "status": "affected", "version": "15.0(2)SE11" }, { "status": "affected", "version": "15.0(2)SE10a" }, { "status": "affected", "version": "15.0(2)SE12" }, { "status": "affected", "version": "15.0(2)SE13" }, { "status": "affected", "version": "15.0(1)SY" }, { "status": "affected", "version": "15.0(1)SY1" }, { "status": "affected", "version": "15.0(1)SY2" }, { "status": "affected", "version": "15.0(1)SY3" }, { "status": "affected", "version": "15.0(1)SY4" }, { "status": "affected", "version": "15.0(1)SY5" }, { "status": "affected", "version": "15.0(1)SY6" }, { "status": "affected", "version": "15.0(1)SY7" }, { "status": "affected", "version": "15.0(1)SY8" }, { "status": "affected", "version": "15.0(1)SY7a" }, { "status": "affected", "version": "15.0(1)SY9" }, { "status": "affected", "version": "15.0(1)SY10" }, { "status": "affected", "version": "12.2(33)SXJ" }, { "status": "affected", "version": "12.2(33)SXJ1" }, { "status": "affected", "version": "12.2(33)SXJ2" }, { "status": "affected", "version": "12.2(33)SXJ3" }, { "status": "affected", "version": "12.2(33)SXJ4" }, { "status": "affected", "version": "12.2(33)SXJ5" }, { "status": "affected", "version": "12.2(33)SXJ6" }, { "status": "affected", "version": "12.2(33)SXJ7" }, { "status": "affected", "version": "12.2(33)SXJ8" }, { "status": "affected", "version": "12.2(33)SXJ9" }, { "status": "affected", "version": "12.2(33)SXJ10" }, { "status": "affected", "version": "15.1(1)SG" }, { "status": "affected", "version": "15.1(2)SG" }, { "status": "affected", "version": "15.1(1)SG1" }, { "status": "affected", "version": "15.1(1)SG2" }, { "status": "affected", "version": "15.1(2)SG1" }, { "status": "affected", "version": "15.1(2)SG2" }, { "status": "affected", "version": "15.1(2)SG3" }, { "status": "affected", "version": "15.1(2)SG4" }, { "status": "affected", "version": "15.1(2)SG5" }, { "status": "affected", "version": "15.1(2)SG6" }, { "status": "affected", "version": "15.1(2)SG7" }, { "status": "affected", "version": "15.1(2)SG8" }, { "status": "affected", "version": "15.2(4)M" }, { "status": "affected", "version": "15.2(4)M1" }, { "status": "affected", "version": "15.2(4)M2" }, { "status": "affected", "version": "15.2(4)M4" }, { "status": "affected", "version": "15.2(4)M3" }, { "status": "affected", "version": "15.2(4)M5" }, { "status": "affected", "version": "15.2(4)M8" }, { "status": "affected", "version": "15.2(4)M10" }, { "status": "affected", "version": "15.2(4)M7" }, { "status": "affected", "version": "15.2(4)M6" }, { "status": "affected", "version": "15.2(4)M9" }, { "status": "affected", "version": "15.2(4)M6a" }, { "status": "affected", "version": "15.2(4)M11" }, { "status": "affected", "version": "15.0(2)SG" }, { "status": "affected", "version": "15.0(2)SG1" }, { "status": "affected", "version": "15.0(2)SG2" }, { "status": "affected", "version": "15.0(2)SG3" }, { "status": "affected", "version": "15.0(2)SG4" }, { "status": "affected", "version": "15.0(2)SG5" }, { "status": "affected", "version": "15.0(2)SG6" }, { "status": "affected", "version": "15.0(2)SG7" }, { "status": "affected", "version": "15.0(2)SG8" }, { "status": "affected", "version": "15.0(2)SG9" }, { "status": "affected", "version": "15.0(2)SG10" }, { "status": "affected", "version": "15.0(2)SG11" }, { "status": "affected", "version": "15.2(2)GC" }, { "status": "affected", "version": "15.2(3)GC" }, { "status": "affected", "version": "15.2(3)GC1" }, { "status": "affected", "version": "15.2(4)GC" }, { "status": "affected", "version": "15.2(4)GC1" }, { "status": "affected", "version": "15.2(4)GC2" }, { "status": "affected", "version": "15.2(4)GC3" }, { "status": "affected", "version": "15.1(1)SY" }, { "status": "affected", "version": "15.1(1)SY1" }, { "status": "affected", "version": "15.1(2)SY" }, { "status": "affected", "version": "15.1(2)SY1" }, { "status": "affected", "version": "15.1(2)SY2" }, { "status": "affected", "version": "15.1(1)SY2" }, { "status": "affected", "version": "15.1(1)SY3" }, { "status": "affected", "version": "15.1(2)SY3" }, { "status": "affected", "version": "15.1(1)SY4" }, { "status": "affected", "version": "15.1(2)SY4" }, { "status": "affected", "version": "15.1(1)SY5" }, { "status": "affected", "version": "15.1(2)SY5" }, { "status": "affected", "version": "15.1(2)SY4a" }, { "status": "affected", "version": "15.1(1)SY6" }, { "status": "affected", "version": "15.1(2)SY6" }, { "status": "affected", "version": "15.1(2)SY7" }, { "status": "affected", "version": "15.1(2)SY8" }, { "status": "affected", "version": "15.1(2)SY9" }, { "status": "affected", "version": "15.1(2)SY10" }, { "status": "affected", "version": "15.1(2)SY11" }, { "status": "affected", "version": "15.1(2)SY12" }, { "status": "affected", "version": "15.1(2)SY13" }, { "status": "affected", "version": "15.1(2)SY14" }, { "status": "affected", "version": "15.1(2)SY15" }, { "status": "affected", "version": "15.1(2)SY16" }, { "status": "affected", "version": "15.4(1)T" }, { "status": "affected", "version": "15.4(2)T" }, { "status": "affected", "version": "15.4(1)T2" }, { "status": "affected", "version": "15.4(1)T1" }, { "status": "affected", "version": "15.4(1)T3" }, { "status": "affected", "version": "15.4(2)T1" }, { "status": "affected", "version": "15.4(2)T3" }, { "status": "affected", "version": "15.4(2)T2" }, { "status": "affected", "version": "15.4(1)T4" }, { "status": "affected", "version": "15.4(2)T4" }, { "status": "affected", "version": "15.0(2)EA" }, { "status": "affected", "version": "15.0(2)EA1" }, { "status": "affected", "version": "15.2(1)E" }, { "status": "affected", "version": "15.2(2)E" }, { "status": "affected", "version": "15.2(1)E1" }, { "status": "affected", "version": "15.2(3)E" }, { "status": "affected", "version": "15.2(1)E2" }, { "status": "affected", "version": "15.2(1)E3" }, { "status": "affected", "version": "15.2(2)E1" }, { "status": "affected", "version": "15.2(4)E" }, { "status": "affected", "version": "15.2(3)E1" }, { "status": "affected", "version": "15.2(2)E2" }, { "status": "affected", "version": "15.2(2a)E1" }, { "status": "affected", "version": "15.2(2)E3" }, { "status": "affected", "version": "15.2(2a)E2" }, { "status": "affected", "version": "15.2(3)E2" }, { "status": "affected", "version": "15.2(3a)E" }, { "status": "affected", "version": "15.2(3)E3" }, { "status": "affected", "version": "15.2(4)E1" }, { "status": "affected", "version": "15.2(2)E4" }, { "status": "affected", "version": "15.2(2)E5" }, { "status": "affected", "version": "15.2(4)E2" }, { "status": "affected", "version": "15.2(3)E4" }, { "status": "affected", "version": "15.2(5)E" }, { "status": "affected", "version": "15.2(4)E3" }, { "status": "affected", "version": "15.2(2)E6" }, { "status": "affected", "version": "15.2(5a)E" }, { "status": "affected", "version": "15.2(5)E1" }, { "status": "affected", "version": "15.2(5b)E" }, { "status": "affected", "version": "15.2(2)E5a" }, { "status": "affected", "version": "15.2(5c)E" }, { "status": "affected", "version": "15.2(2)E5b" }, { "status": "affected", "version": "15.2(5a)E1" }, { "status": "affected", "version": "15.2(4)E4" }, { "status": "affected", "version": "15.2(2)E7" }, { "status": "affected", "version": "15.2(5)E2" }, { "status": "affected", "version": "15.2(6)E" }, { "status": "affected", "version": "15.2(4)E5" }, { "status": "affected", "version": "15.2(5)E2c" }, { "status": "affected", "version": "15.2(2)E8" }, { "status": "affected", "version": "15.2(6)E0a" }, { "status": "affected", "version": "15.2(6)E1" }, { "status": "affected", "version": "15.2(6)E0c" }, { "status": "affected", "version": "15.2(4)E6" }, { "status": "affected", "version": "15.2(6)E2" }, { "status": "affected", "version": "15.2(2)E9" }, { "status": "affected", "version": "15.2(4)E7" }, { "status": "affected", "version": "15.2(7)E" }, { "status": "affected", "version": "15.2(2)E10" }, { "status": "affected", "version": "15.2(4)E8" }, { "status": "affected", "version": "15.2(6)E2a" }, { "status": "affected", "version": "15.2(6)E2b" }, { "status": "affected", "version": "15.2(7)E1" }, { "status": "affected", "version": "15.2(7)E0a" }, { "status": "affected", "version": "15.2(7)E0b" }, { "status": "affected", "version": "15.2(7)E0s" }, { "status": "affected", "version": "15.2(6)E3" }, { "status": "affected", "version": "15.2(4)E9" }, { "status": "affected", "version": "15.2(7)E2" }, { "status": "affected", "version": "15.2(7a)E0b" }, { "status": "affected", "version": "15.2(4)E10" }, { "status": "affected", "version": "15.2(7)E3" }, { "status": "affected", "version": "15.2(7)E1a" }, { "status": "affected", "version": "15.2(7b)E0b" }, { "status": "affected", "version": "15.2(7)E2a" }, { "status": "affected", "version": "15.2(4)E10a" }, { "status": "affected", "version": "15.2(7)E4" }, { "status": "affected", "version": "15.2(7)E3k" }, { "status": "affected", "version": "15.2(8)E" }, { "status": "affected", "version": "15.2(8)E1" }, { "status": "affected", "version": "15.2(7)E5" }, { "status": "affected", "version": "15.2(7)E6" }, { "status": "affected", "version": "15.2(8)E2" }, { "status": "affected", "version": "15.2(4)E10d" }, { "status": "affected", "version": "15.2(7)E7" }, { "status": "affected", "version": "15.2(8)E3" }, { "status": "affected", "version": "15.2(7)E8" }, { "status": "affected", "version": "15.2(8)E4" }, { "status": "affected", "version": "15.2(7)E9" }, { "status": "affected", "version": "15.2(8)E5" }, { "status": "affected", "version": "15.2(8)E6" }, { "status": "affected", "version": "15.2(7)E10" }, { "status": "affected", "version": "15.2(7)E11" }, { "status": "affected", "version": "15.2(8)E7" }, { "status": "affected", "version": "15.2(7)E12" }, { "status": "affected", "version": "15.2(2)JB" }, { "status": "affected", "version": "15.2(2)JB2" }, { "status": "affected", "version": "15.2(4)JB" }, { "status": "affected", "version": "15.2(2)JB3" }, { "status": "affected", "version": "15.2(4)JB1" }, { "status": "affected", "version": "15.2(4)JB2" }, { "status": "affected", "version": "15.2(4)JB3" }, { "status": "affected", "version": "15.2(4)JB3a" }, { "status": "affected", "version": "15.2(2)JB4" }, { "status": "affected", "version": "15.2(4)JB4" }, { "status": "affected", "version": "15.2(4)JB3h" }, { "status": "affected", "version": "15.2(4)JB3b" }, { "status": "affected", "version": "15.2(4)JB5" }, { "status": "affected", "version": "15.2(4)JB6" }, { "status": "affected", "version": "15.2(2)JB5" }, { "status": "affected", "version": "15.2(2)JB6" }, { "status": "affected", "version": "15.2(2)JAX" }, { "status": "affected", "version": "15.3(3)M" }, { "status": "affected", "version": "15.3(3)M1" }, { "status": "affected", "version": "15.3(3)M2" }, { "status": "affected", "version": "15.3(3)M3" }, { "status": "affected", "version": "15.3(3)M5" }, { "status": "affected", "version": "15.3(3)M4" }, { "status": "affected", "version": "15.3(3)M6" }, { "status": "affected", "version": "15.3(3)M7" }, { "status": "affected", "version": "15.3(3)M8" }, { "status": "affected", "version": "15.3(3)M9" }, { "status": "affected", "version": "15.3(3)M10" }, { "status": "affected", "version": "15.3(3)M8a" }, { "status": "affected", "version": "15.2(4)JN" }, { "status": "affected", "version": "15.2(1)EY" }, { "status": "affected", "version": "15.0(2)EJ" }, { "status": "affected", "version": "15.0(2)EJ1" }, { "status": "affected", "version": "15.2(1)SY" }, { "status": "affected", "version": "15.2(1)SY1" }, { "status": "affected", "version": "15.2(1)SY0a" }, { "status": "affected", "version": "15.2(1)SY2" }, { "status": "affected", "version": "15.2(2)SY" }, { "status": "affected", "version": "15.2(1)SY1a" }, { "status": "affected", "version": "15.2(2)SY1" }, { "status": "affected", "version": "15.2(2)SY2" }, { "status": "affected", "version": "15.2(1)SY3" }, { "status": "affected", "version": "15.2(1)SY4" }, { "status": "affected", "version": "15.2(2)SY3" }, { "status": "affected", "version": "15.2(1)SY5" }, { "status": "affected", "version": "15.2(1)SY6" }, { "status": "affected", "version": "15.2(1)SY7" }, { "status": "affected", "version": "15.2(1)SY8" }, { "status": "affected", "version": "15.2(5)EX" }, { "status": "affected", "version": "15.0(2)EK" }, { "status": "affected", "version": "15.0(2)EK1" }, { "status": "affected", "version": "15.4(1)CG" }, { "status": "affected", "version": "15.4(1)CG1" }, { "status": "affected", "version": "15.4(2)CG" }, { "status": "affected", "version": "15.5(1)S" }, { "status": "affected", "version": "15.5(2)S" }, { "status": "affected", "version": "15.5(1)S1" }, { "status": "affected", "version": "15.5(3)S" }, { "status": "affected", "version": "15.5(1)S2" }, { "status": "affected", "version": "15.5(1)S3" }, { "status": "affected", "version": "15.5(2)S1" }, { "status": "affected", "version": "15.5(2)S2" }, { "status": "affected", "version": "15.5(3)S1" }, { "status": "affected", "version": "15.5(3)S1a" }, { "status": "affected", "version": "15.5(2)S3" }, { "status": "affected", "version": "15.5(3)S2" }, { "status": "affected", "version": "15.5(3)S0a" }, { "status": "affected", "version": "15.5(3)S3" }, { "status": "affected", "version": "15.5(1)S4" }, { "status": "affected", "version": "15.5(2)S4" }, { "status": "affected", "version": "15.5(3)S4" }, { "status": "affected", "version": "15.5(3)S5" }, { "status": "affected", "version": "15.5(3)S6" }, { "status": "affected", "version": "15.5(3)S6a" }, { "status": "affected", "version": "15.5(3)S7" }, { "status": "affected", "version": "15.5(3)S6b" }, { "status": "affected", "version": "15.5(3)S8" }, { "status": "affected", "version": "15.5(3)S9" }, { "status": "affected", "version": "15.5(3)S10" }, { "status": "affected", "version": "15.5(3)S9a" }, { "status": "affected", "version": "15.5(1)T" }, { "status": "affected", "version": "15.5(1)T1" }, { "status": "affected", "version": "15.5(2)T" }, { "status": "affected", "version": "15.5(1)T2" }, { "status": "affected", "version": "15.5(1)T3" }, { "status": "affected", "version": "15.5(2)T1" }, { "status": "affected", "version": "15.5(2)T2" }, { "status": "affected", "version": "15.5(2)T3" }, { "status": "affected", "version": "15.5(2)T4" }, { "status": "affected", "version": "15.5(1)T4" }, { "status": "affected", "version": "15.2(2)EA" }, { "status": "affected", "version": "15.2(2)EA1" }, { "status": "affected", "version": "15.2(2)EA2" }, { "status": "affected", "version": "15.2(3)EA" }, { "status": "affected", "version": "15.2(4)EA" }, { "status": "affected", "version": "15.2(4)EA1" }, { "status": "affected", "version": "15.2(2)EA3" }, { "status": "affected", "version": "15.2(4)EA3" }, { "status": "affected", "version": "15.2(5)EA" }, { "status": "affected", "version": "15.2(4)EA4" }, { "status": "affected", "version": "15.2(4)EA5" }, { "status": "affected", "version": "15.2(4)EA6" }, { "status": "affected", "version": "15.2(4)EA7" }, { "status": "affected", "version": "15.2(4)EA8" }, { "status": "affected", "version": "15.2(4)EA9" }, { "status": "affected", "version": "15.2(4)EA9a" }, { "status": "affected", "version": "15.3(3)JN3" }, { "status": "affected", "version": "15.3(3)JN4" }, { "status": "affected", "version": "15.3(3)JN7" }, { "status": "affected", "version": "15.3(3)JN8" }, { "status": "affected", "version": "15.3(3)JN9" }, { "status": "affected", "version": "15.5(3)M" }, { "status": "affected", "version": "15.5(3)M1" }, { "status": "affected", "version": "15.5(3)M0a" }, { "status": "affected", "version": "15.5(3)M2" }, { "status": "affected", "version": "15.5(3)M3" }, { "status": "affected", "version": "15.5(3)M4" }, { "status": "affected", "version": "15.5(3)M4a" }, { "status": "affected", "version": "15.5(3)M5" }, { "status": "affected", "version": "15.5(3)M6" }, { "status": "affected", "version": "15.5(3)M7" }, { "status": "affected", "version": "15.5(3)M6a" }, { "status": "affected", "version": "15.5(3)M8" }, { "status": "affected", "version": "15.5(3)M9" }, { "status": "affected", "version": "15.5(3)M10" }, { "status": "affected", "version": "15.3(3)JA1m" }, { "status": "affected", "version": "15.3(3)JA1" }, { "status": "affected", "version": "15.3(3)JA4" }, { "status": "affected", "version": "15.3(3)JA5" }, { "status": "affected", "version": "15.3(3)JA6" }, { "status": "affected", "version": "15.3(3)JA7" }, { "status": "affected", "version": "15.3(3)JA8" }, { "status": "affected", "version": "15.3(3)JA10" }, { "status": "affected", "version": "15.3(3)JA11" }, { "status": "affected", "version": "15.3(3)JA12" }, { "status": "affected", "version": "15.3(3)JAA" }, { "status": "affected", "version": "15.3(3)JAA11" }, { "status": "affected", "version": "15.3(3)JAA12" }, { "status": "affected", "version": "15.3(3)JAB" }, { "status": "affected", "version": "15.3(3)JB" }, { "status": "affected", "version": "15.5(3)SN" }, { "status": "affected", "version": "15.0(2)SQD" }, { "status": "affected", "version": "15.0(2)SQD1" }, { "status": "affected", "version": "15.0(2)SQD2" }, { "status": "affected", "version": "15.0(2)SQD3" }, { "status": "affected", "version": "15.0(2)SQD4" }, { "status": "affected", "version": "15.0(2)SQD5" }, { "status": "affected", "version": "15.0(2)SQD6" }, { "status": "affected", "version": "15.0(2)SQD7" }, { "status": "affected", "version": "15.0(2)SQD8" }, { "status": "affected", "version": "15.6(1)S" }, { "status": "affected", "version": "15.6(2)S" }, { "status": "affected", "version": "15.6(2)S1" }, { "status": "affected", "version": "15.6(1)S1" }, { "status": "affected", "version": "15.6(1)S2" }, { "status": "affected", "version": "15.6(2)S2" }, { "status": "affected", "version": "15.6(1)S3" }, { "status": "affected", "version": "15.6(2)S3" }, { "status": "affected", "version": "15.6(1)S4" }, { "status": "affected", "version": "15.6(2)S4" }, { "status": "affected", "version": "15.6(1)T" }, { "status": "affected", "version": "15.6(2)T" }, { "status": "affected", "version": "15.6(1)T0a" }, { "status": "affected", "version": "15.6(1)T1" }, { "status": "affected", "version": "15.6(2)T1" }, { "status": "affected", "version": "15.6(1)T2" }, { "status": "affected", "version": "15.6(2)T2" }, { "status": "affected", "version": "15.6(1)T3" }, { "status": "affected", "version": "15.6(2)T3" }, { "status": "affected", "version": "15.3(3)JNB" }, { "status": "affected", "version": "15.3(3)JNB1" }, { "status": "affected", "version": "15.3(3)JNB2" }, { "status": "affected", "version": "15.3(3)JNB3" }, { "status": "affected", "version": "15.3(3)JNB4" }, { "status": "affected", "version": "15.3(3)JNB6" }, { "status": "affected", "version": "15.3(3)JNB5" }, { "status": "affected", "version": "15.3(3)JAX" }, { "status": "affected", "version": "15.3(3)JAX1" }, { "status": "affected", "version": "15.3(3)JAX2" }, { "status": "affected", "version": "15.3(3)JBB" }, { "status": "affected", "version": "15.3(3)JBB1" }, { "status": "affected", "version": "15.3(3)JBB2" }, { "status": "affected", "version": "15.3(3)JBB4" }, { "status": "affected", "version": "15.3(3)JBB5" }, { "status": "affected", "version": "15.3(3)JBB6" }, { "status": "affected", "version": "15.3(3)JBB8" }, { "status": "affected", "version": "15.3(3)JBB6a" }, { "status": "affected", "version": "15.3(3)JC" }, { "status": "affected", "version": "15.3(3)JC1" }, { "status": "affected", "version": "15.3(3)JC2" }, { "status": "affected", "version": "15.3(3)JC3" }, { "status": "affected", "version": "15.3(3)JC4" }, { "status": "affected", "version": "15.3(3)JC5" }, { "status": "affected", "version": "15.3(3)JC6" }, { "status": "affected", "version": "15.3(3)JC8" }, { "status": "affected", "version": "15.3(3)JC9" }, { "status": "affected", "version": "15.3(3)JC14" }, { "status": "affected", "version": "15.3(1)SY" }, { "status": "affected", "version": "15.3(1)SY1" }, { "status": "affected", "version": "15.3(1)SY2" }, { "status": "affected", "version": "15.3(3)JNC" }, { "status": "affected", "version": "15.3(3)JNC1" }, { "status": "affected", "version": "15.3(3)JNC4" }, { "status": "affected", "version": "15.3(3)JNP" }, { "status": "affected", "version": "15.3(3)JNP1" }, { "status": "affected", "version": "15.3(3)JNP3" }, { "status": "affected", "version": "15.6(2)SP" }, { "status": "affected", "version": "15.6(2)SP1" }, { "status": "affected", "version": "15.6(2)SP2" }, { "status": "affected", "version": "15.6(2)SP3" }, { "status": "affected", "version": "15.6(2)SP4" }, { "status": "affected", "version": "15.6(2)SP5" }, { "status": "affected", "version": "15.6(2)SP6" }, { "status": "affected", "version": "15.6(2)SP7" }, { "status": "affected", "version": "15.6(2)SP8" }, { "status": "affected", "version": "15.6(2)SP9" }, { "status": "affected", "version": "15.6(2)SN" }, { "status": "affected", "version": "15.3(3)JPB" }, { "status": "affected", "version": "15.3(3)JPB1" }, { "status": "affected", "version": "15.3(3)JD" }, { "status": "affected", "version": "15.3(3)JD2" }, { "status": "affected", "version": "15.3(3)JD3" }, { "status": "affected", "version": "15.3(3)JD4" }, { "status": "affected", "version": "15.3(3)JD5" }, { "status": "affected", "version": "15.3(3)JD6" }, { "status": "affected", "version": "15.3(3)JD7" }, { "status": "affected", "version": "15.3(3)JD8" }, { "status": "affected", "version": "15.3(3)JD9" }, { "status": "affected", "version": "15.3(3)JD11" }, { "status": "affected", "version": "15.3(3)JD13" }, { "status": "affected", "version": "15.3(3)JD14" }, { "status": "affected", "version": "15.3(3)JD16" }, { "status": "affected", "version": "15.3(3)JD17" }, { "status": "affected", "version": "15.6(3)M" }, { "status": "affected", "version": "15.6(3)M1" }, { "status": "affected", "version": "15.6(3)M0a" }, { "status": "affected", "version": "15.6(3)M1b" }, { "status": "affected", "version": "15.6(3)M2" }, { "status": "affected", "version": "15.6(3)M2a" }, { "status": "affected", "version": "15.6(3)M3" }, { "status": "affected", "version": "15.6(3)M3a" }, { "status": "affected", "version": "15.6(3)M4" }, { "status": "affected", "version": "15.6(3)M5" }, { "status": "affected", "version": "15.6(3)M6" }, { "status": "affected", "version": "15.6(3)M7" }, { "status": "affected", "version": "15.6(3)M6a" }, { "status": "affected", "version": "15.6(3)M6b" }, { "status": "affected", "version": "15.6(3)M8" }, { "status": "affected", "version": "15.6(3)M9" }, { "status": "affected", "version": "15.2(4)EC1" }, { "status": "affected", "version": "15.2(4)EC2" }, { "status": "affected", "version": "15.3(3)JPC" }, { "status": "affected", "version": "15.3(3)JPC1" }, { "status": "affected", "version": "15.3(3)JPC2" }, { "status": "affected", "version": "15.3(3)JPC3" }, { "status": "affected", "version": "15.3(3)JPC5" }, { "status": "affected", "version": "15.3(3)JND" }, { "status": "affected", "version": "15.3(3)JND1" }, { "status": "affected", "version": "15.3(3)JND2" }, { "status": "affected", "version": "15.3(3)JND3" }, { "status": "affected", "version": "15.4(1)SY" }, { "status": "affected", "version": "15.4(1)SY1" }, { "status": "affected", "version": "15.4(1)SY2" }, { "status": "affected", "version": "15.4(1)SY3" }, { "status": "affected", "version": "15.4(1)SY4" }, { "status": "affected", "version": "15.3(3)JE" }, { "status": "affected", "version": "15.3(3)JPD" }, { "status": "affected", "version": "15.3(3)JDA7" }, { "status": "affected", "version": "15.3(3)JDA8" }, { "status": "affected", "version": "15.3(3)JDA9" }, { "status": "affected", "version": "15.3(3)JDA11" }, { "status": "affected", "version": "15.3(3)JDA13" }, { "status": "affected", "version": "15.3(3)JDA14" }, { "status": "affected", "version": "15.3(3)JDA16" }, { "status": "affected", "version": "15.3(3)JDA17" }, { "status": "affected", "version": "15.5(1)SY" }, { "status": "affected", "version": "15.5(1)SY1" }, { "status": "affected", "version": "15.5(1)SY2" }, { "status": "affected", "version": "15.5(1)SY3" }, { "status": "affected", "version": "15.5(1)SY4" }, { "status": "affected", "version": "15.5(1)SY5" }, { "status": "affected", "version": "15.5(1)SY6" }, { "status": "affected", "version": "15.5(1)SY7" }, { "status": "affected", "version": "15.5(1)SY8" }, { "status": "affected", "version": "15.5(1)SY9" }, { "status": "affected", "version": "15.5(1)SY10" }, { "status": "affected", "version": "15.5(1)SY11" }, { "status": "affected", "version": "15.5(1)SY12" }, { "status": "affected", "version": "15.5(1)SY13" }, { "status": "affected", "version": "15.5(1)SY14" }, { "status": "affected", "version": "15.5(1)SY15" }, { "status": "affected", "version": "15.3(3)JF" }, { "status": "affected", "version": "15.3(3)JF1" }, { "status": "affected", "version": "15.3(3)JF2" }, { "status": "affected", "version": "15.3(3)JF4" }, { "status": "affected", "version": "15.3(3)JF5" }, { "status": "affected", "version": "15.3(3)JF6" }, { "status": "affected", "version": "15.3(3)JF7" }, { "status": "affected", "version": "15.3(3)JF8" }, { "status": "affected", "version": "15.3(3)JF9" }, { "status": "affected", "version": "15.3(3)JF10" }, { "status": "affected", "version": "15.3(3)JF11" }, { "status": "affected", "version": "15.3(3)JF12" }, { "status": "affected", "version": "15.3(3)JF12i" }, { "status": "affected", "version": "15.3(3)JF14" }, { "status": "affected", "version": "15.3(3)JF14i" }, { "status": "affected", "version": "15.3(3)JF15" }, { "status": "affected", "version": "15.3(3)JCA7" }, { "status": "affected", "version": "15.3(3)JCA8" }, { "status": "affected", "version": "15.3(3)JCA9" }, { "status": "affected", "version": "15.7(3)M" }, { "status": "affected", "version": "15.7(3)M1" }, { "status": "affected", "version": "15.7(3)M0a" }, { "status": "affected", "version": "15.7(3)M3" }, { "status": "affected", "version": "15.7(3)M2" }, { "status": "affected", "version": "15.7(3)M4" }, { "status": "affected", "version": "15.7(3)M5" }, { "status": "affected", "version": "15.7(3)M4a" }, { "status": "affected", "version": "15.7(3)M4b" }, { "status": "affected", "version": "15.7(3)M6" }, { "status": "affected", "version": "15.7(3)M7" }, { "status": "affected", "version": "15.7(3)M8" }, { "status": "affected", "version": "15.7(3)M9" }, { "status": "affected", "version": "15.3(3)JG" }, { "status": "affected", "version": "15.3(3)JG1" }, { "status": "affected", "version": "15.3(3)JH" }, { "status": "affected", "version": "15.3(3)JH1" }, { "status": "affected", "version": "15.3(3)JI1" }, { "status": "affected", "version": "15.3(3)JI3" }, { "status": "affected", "version": "15.3(3)JI4" }, { "status": "affected", "version": "15.3(3)JI5" }, { "status": "affected", "version": "15.3(3)JI6" }, { "status": "affected", "version": "15.8(3)M" }, { "status": "affected", "version": "15.8(3)M1" }, { "status": "affected", "version": "15.8(3)M0a" }, { "status": "affected", "version": "15.8(3)M0b" }, { "status": "affected", "version": "15.8(3)M2" }, { "status": "affected", "version": "15.8(3)M1a" }, { "status": "affected", "version": "15.8(3)M3" }, { "status": "affected", "version": "15.8(3)M2a" }, { "status": "affected", "version": "15.8(3)M4" }, { "status": "affected", "version": "15.8(3)M3a" }, { "status": "affected", "version": "15.8(3)M3b" }, { "status": "affected", "version": "15.8(3)M5" }, { "status": "affected", "version": "15.8(3)M6" }, { "status": "affected", "version": "15.8(3)M7" }, { "status": "affected", "version": "15.8(3)M8" }, { "status": "affected", "version": "15.8(3)M9" }, { "status": "affected", "version": "15.9(3)M" }, { "status": "affected", "version": "15.9(3)M1" }, { "status": "affected", "version": "15.9(3)M0a" }, { "status": "affected", "version": "15.9(3)M2" }, { "status": "affected", "version": "15.9(3)M3" }, { "status": "affected", "version": "15.9(3)M2a" }, { "status": "affected", "version": "15.9(3)M3a" }, { "status": "affected", "version": "15.9(3)M4" }, { "status": "affected", "version": "15.9(3)M3b" }, { "status": "affected", "version": "15.9(3)M5" }, { "status": "affected", "version": "15.9(3)M4a" }, { "status": "affected", "version": "15.9(3)M6" }, { "status": "affected", "version": "15.9(3)M7" }, { "status": "affected", "version": "15.9(3)M6a" }, { "status": "affected", "version": "15.9(3)M6b" }, { "status": "affected", "version": "15.9(3)M8" }, { "status": "affected", "version": "15.9(3)M7a" }, { "status": "affected", "version": "15.9(3)M9" }, { "status": "affected", "version": "15.9(3)M8b" }, { "status": "affected", "version": "15.9(3)M10" }, { "status": "affected", "version": "15.9(3)M11" }, { "status": "affected", "version": "15.3(3)JK" }, { "status": "affected", "version": "15.3(3)JK1" }, { "status": "affected", "version": "15.3(3)JK2" }, { "status": "affected", "version": "15.3(3)JK3" }, { "status": "affected", "version": "15.3(3)JK2a" }, { "status": "affected", "version": "15.3(3)JK1t" }, { "status": "affected", "version": "15.3(3)JK4" }, { "status": "affected", "version": "15.3(3)JK5" }, { "status": "affected", "version": "15.3(3)JK6" }, { "status": "affected", "version": "15.3(3)JK7" }, { "status": "affected", "version": "15.3(3)JK8" }, { "status": "affected", "version": "15.3(3)JK8a" }, { "status": "affected", "version": "15.3(3)JK8b" }, { "status": "affected", "version": "15.3(3)JK9" }, { "status": "affected", "version": "15.3(3)JK10" }, { "status": "affected", "version": "15.3(3)JK11" }, { "status": "affected", "version": "15.3(3)JJ" }, { "status": "affected", "version": "15.3(3)JJ1" }, { "status": "affected", "version": "15.3(3)JPI1" }, { "status": "affected", "version": "15.3(3)JPI4" }, { "status": "affected", "version": "15.3(3)JPI1t" }, { "status": "affected", "version": "15.3(3)JPI5" }, { "status": "affected", "version": "15.3(3)JPI7" }, { "status": "affected", "version": "15.3(3)JPI6a" }, { "status": "affected", "version": "15.3(3)JPI8a" }, { "status": "affected", "version": "15.3(3)JPI9" }, { "status": "affected", "version": "15.3(3)JPI10" }, { "status": "affected", "version": "15.3(3)JPJ2" }, { "status": "affected", "version": "15.3(3)JPJ3" }, { "status": "affected", "version": "15.3(3)JPJ2t" }, { "status": "affected", "version": "15.3(3)JPJ3a" }, { "status": "affected", "version": "15.3(3)JPJ4" }, { "status": "affected", "version": "15.3(3)JPJ5" }, { "status": "affected", "version": "15.3(3)JPJ6" }, { "status": "affected", "version": "15.3(3)JPJ7" }, { "status": "affected", "version": "15.3(3)JPJ7c" }, { "status": "affected", "version": "15.3(3)JPJ8a" }, { "status": "affected", "version": "15.3(3)JPJ9" }, { "status": "affected", "version": "15.3(3)JPJ10" }, { "status": "affected", "version": "15.3(3)JPJ11" }, { "status": "affected", "version": "15.3(3)JPK" }, { "status": "affected", "version": "15.3(3)JPK1" }, { "status": "affected", "version": "15.3(3)JPK2" }, { "status": "affected", "version": "15.3(3)JPK3" }, { "status": "affected", "version": "15.3(3)JPK4" }, { "status": "affected", "version": "15.3(3)JPK5" }, { "status": "affected", "version": "15.3(3)JPK6" }, { "status": "affected", "version": "15.3(3)JPK7" }, { "status": "affected", "version": "15.3(3)JPK8" }, { "status": "affected", "version": "15.3(3)JPK9" }, { "status": "affected", "version": "15.3(3)JPL" }, { "status": "affected", "version": "15.3(3)JPM" }, { "status": "affected", "version": "15.3(3)JPN" }, { "status": "affected", "version": "15.3(3)JPN1" }, { "status": "affected", "version": "15.3(3)JPN2" }, { "status": "affected", "version": "15.3(3)JPN3" }, { "status": "affected", "version": "15.3(3)JPN4" }, { "status": "affected", "version": "15.3(3)JPN5" }, { "status": "affected", "version": "15.3(3)JPN6" }, { "status": "affected", "version": "15.3(3)JPO" }, { "status": "affected", "version": "15.3(3)JPP" }, { "status": "affected", "version": "15.3(3)JPQ" }, { "status": "affected", "version": "15.3(3)JPQ1" }, { "status": "affected", "version": "15.3(3)JPQ2" }, { "status": "affected", "version": "15.3(3)JPQ3" }, { "status": "affected", "version": "15.3(3)JPQ4" }, { "status": "affected", "version": "15.3(3)JPQ5" }, { "status": "affected", "version": "15.3(3)JPR" }, { "status": "affected", "version": "15.3(3)JPS" }, { "status": "affected", "version": "15.3(3)JPT" }, { "status": "affected", "version": "15.3(3)JPT1" }, { "status": "affected", "version": "15.3(3)JPT2" } ] }, { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.5.0E" }, { "status": "affected", "version": "3.5.1E" }, { "status": "affected", "version": "3.5.2E" }, { "status": "affected", "version": "3.5.3E" }, { "status": "affected", "version": "3.6.0E" }, { "status": "affected", "version": "3.6.1E" }, { "status": "affected", "version": "3.6.2aE" }, { "status": "affected", "version": "3.6.2E" }, { "status": "affected", "version": "3.6.3E" }, { "status": "affected", "version": "3.6.4E" }, { "status": "affected", "version": "3.6.5E" }, { "status": "affected", "version": "3.6.6E" }, { "status": "affected", "version": "3.6.5aE" }, { "status": "affected", "version": "3.6.7E" }, { "status": "affected", "version": "3.6.8E" }, { "status": "affected", "version": "3.6.7bE" }, { "status": "affected", "version": "3.6.9E" }, { "status": "affected", "version": "3.6.10E" }, { "status": "affected", "version": "3.14.0S" }, { "status": "affected", "version": "3.14.1S" }, { "status": "affected", "version": "3.14.2S" }, { "status": "affected", "version": "3.14.3S" }, { "status": "affected", "version": "3.14.4S" }, { "status": "affected", "version": "3.15.0S" }, { "status": "affected", "version": "3.15.1S" }, { "status": "affected", "version": "3.15.2S" }, { "status": "affected", "version": "3.15.1cS" }, { "status": "affected", "version": "3.15.3S" }, { "status": "affected", "version": "3.15.4S" }, { "status": "affected", "version": "3.7.0E" }, { "status": "affected", "version": "3.7.1E" }, { "status": "affected", "version": "3.7.2E" }, { "status": "affected", "version": "3.7.3E" }, { "status": "affected", "version": "3.7.4E" }, { "status": "affected", "version": "3.7.5E" }, { "status": "affected", "version": "3.5.0SQ" }, { "status": "affected", "version": "3.5.1SQ" }, { "status": "affected", "version": "3.5.2SQ" }, { "status": "affected", "version": "3.5.3SQ" }, { "status": "affected", "version": "3.5.4SQ" }, { "status": "affected", "version": "3.5.5SQ" }, { "status": "affected", "version": "3.5.6SQ" }, { "status": "affected", "version": "3.5.7SQ" }, { "status": "affected", "version": "3.5.8SQ" }, { "status": "affected", "version": "3.16.0S" }, { "status": "affected", "version": "3.16.1S" }, { "status": "affected", "version": "3.16.1aS" }, { "status": "affected", "version": "3.16.2S" }, { "status": "affected", "version": "3.16.2aS" }, { "status": "affected", "version": "3.16.0cS" }, { "status": "affected", "version": "3.16.3S" }, { "status": "affected", "version": "3.16.2bS" }, { "status": "affected", "version": "3.16.3aS" }, { "status": "affected", "version": "3.16.4S" }, { "status": "affected", "version": "3.16.4aS" }, { "status": "affected", "version": "3.16.4bS" }, { "status": "affected", "version": "3.16.5S" }, { "status": "affected", "version": "3.16.4dS" }, { "status": "affected", "version": "3.16.6S" }, { "status": "affected", "version": "3.16.7S" }, { "status": "affected", "version": "3.16.6bS" }, { "status": "affected", "version": "3.16.7aS" }, { "status": "affected", "version": "3.16.7bS" }, { "status": "affected", "version": "3.16.8S" }, { "status": "affected", "version": "3.16.9S" }, { "status": "affected", "version": "3.16.10S" }, { "status": "affected", "version": "3.17.0S" }, { "status": "affected", "version": "3.17.1S" }, { "status": "affected", "version": "3.17.2S" }, { "status": "affected", "version": "3.17.1aS" }, { "status": "affected", "version": "3.17.3S" }, { "status": "affected", "version": "3.17.4S" }, { "status": "affected", "version": "3.8.0E" }, { "status": "affected", "version": "3.8.1E" }, { "status": "affected", "version": "3.8.2E" }, { "status": "affected", "version": "3.8.3E" }, { "status": "affected", "version": "3.8.4E" }, { "status": "affected", "version": "3.8.5E" }, { "status": "affected", "version": "3.8.5aE" }, { "status": "affected", "version": "3.8.6E" }, { "status": "affected", "version": "3.8.7E" }, { "status": "affected", "version": "3.8.8E" }, { "status": "affected", "version": "3.8.9E" }, { "status": "affected", "version": "3.8.10E" }, { "status": "affected", "version": "3.18.0aS" }, { "status": "affected", "version": "3.18.0S" }, { "status": "affected", "version": "3.18.1S" }, { "status": "affected", "version": "3.18.2S" }, { "status": "affected", "version": "3.18.3S" }, { "status": "affected", "version": "3.18.4S" }, { "status": "affected", "version": "3.18.0SP" }, { "status": "affected", "version": "3.18.1SP" }, { "status": "affected", "version": "3.18.1aSP" }, { "status": "affected", "version": "3.18.1bSP" }, { "status": "affected", "version": "3.18.1cSP" }, { "status": "affected", "version": "3.18.2SP" }, { "status": "affected", "version": "3.18.2aSP" }, { "status": "affected", "version": "3.18.3SP" }, { "status": "affected", "version": "3.18.4SP" }, { "status": "affected", "version": "3.18.3aSP" }, { "status": "affected", "version": "3.18.3bSP" }, { "status": "affected", "version": "3.18.5SP" }, { "status": "affected", "version": "3.18.6SP" }, { "status": "affected", "version": "3.18.7SP" }, { "status": "affected", "version": "3.18.8aSP" }, { "status": "affected", "version": "3.18.9SP" }, { "status": "affected", "version": "3.9.0E" }, { "status": "affected", "version": "3.9.1E" }, { "status": "affected", "version": "3.9.2E" }, { "status": "affected", "version": "16.6.1" }, { "status": "affected", "version": "16.6.2" }, { "status": "affected", "version": "16.6.3" }, { "status": "affected", "version": "16.6.4" }, { "status": "affected", "version": "16.6.5" }, { "status": "affected", "version": "16.6.4a" }, { "status": "affected", "version": "16.6.5a" }, { "status": "affected", "version": "16.6.6" }, { "status": "affected", "version": "16.6.7" }, { "status": "affected", "version": "16.6.8" }, { "status": "affected", "version": "16.6.9" }, { "status": "affected", "version": "16.6.10" }, { "status": "affected", "version": "16.7.1" }, { "status": "affected", "version": "16.7.1a" }, { "status": "affected", "version": "16.7.1b" }, { "status": "affected", "version": "16.7.2" }, { "status": "affected", "version": "16.7.3" }, { "status": "affected", "version": "16.7.4" }, { "status": "affected", "version": "16.8.1" }, { "status": "affected", "version": "16.8.1a" }, { "status": "affected", "version": "16.8.1b" }, { "status": "affected", "version": "16.8.1s" }, { "status": "affected", "version": "16.8.1c" }, { "status": "affected", "version": "16.8.1d" }, { "status": "affected", "version": "16.8.2" }, { "status": "affected", "version": "16.8.1e" }, { "status": "affected", "version": "16.8.3" }, { "status": "affected", "version": "16.9.1" }, { "status": "affected", "version": "16.9.2" }, { "status": "affected", "version": "16.9.1a" }, { "status": "affected", "version": "16.9.1b" }, { "status": "affected", "version": "16.9.1s" }, { "status": "affected", "version": "16.9.3" }, { "status": "affected", "version": "16.9.4" }, { "status": "affected", "version": "16.9.3a" }, { "status": "affected", "version": "16.9.5" }, { "status": "affected", "version": "16.9.5f" }, { "status": "affected", "version": "16.9.6" }, { "status": "affected", "version": "16.9.7" }, { "status": "affected", "version": "16.9.8" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "16.10.1a" }, { "status": "affected", "version": "16.10.1b" }, { "status": "affected", "version": "16.10.1s" }, { "status": "affected", "version": "16.10.1c" }, { "status": "affected", "version": "16.10.1e" }, { "status": "affected", "version": "16.10.1d" }, { "status": "affected", "version": "16.10.2" }, { "status": "affected", "version": "16.10.1f" }, { "status": "affected", "version": "16.10.1g" }, { "status": "affected", "version": "16.10.3" }, { "status": "affected", "version": "3.10.0E" }, { "status": "affected", "version": "3.10.1E" }, { "status": "affected", "version": "3.10.0cE" }, { "status": "affected", "version": "3.10.2E" }, { "status": "affected", "version": "3.10.3E" }, { "status": "affected", "version": "16.11.1" }, { "status": "affected", "version": "16.11.1a" }, { "status": "affected", "version": "16.11.1b" }, { "status": "affected", "version": "16.11.2" }, { "status": "affected", "version": "16.11.1s" }, { "status": "affected", "version": "16.12.1" }, { "status": "affected", "version": "16.12.1s" }, { "status": "affected", "version": "16.12.1a" }, { "status": "affected", "version": "16.12.1c" }, { "status": "affected", "version": "16.12.1w" }, { "status": "affected", "version": "16.12.2" }, { "status": "affected", "version": "16.12.1y" }, { "status": "affected", "version": "16.12.2a" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "16.12.2s" }, { "status": "affected", "version": "16.12.1x" }, { "status": "affected", "version": "16.12.1t" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.3s" }, { "status": "affected", "version": "16.12.3a" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "16.12.1z1" }, { "status": "affected", "version": "16.12.5a" }, { "status": "affected", "version": "16.12.5b" }, { "status": "affected", "version": "16.12.1z2" }, { "status": "affected", "version": "16.12.6a" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "16.12.9" }, { "status": "affected", "version": "16.12.10" }, { "status": "affected", "version": "16.12.10a" }, { "status": "affected", "version": "16.12.11" }, { "status": "affected", "version": "16.12.12" }, { "status": "affected", "version": "16.12.13" }, { "status": "affected", "version": "3.11.0E" }, { "status": "affected", "version": "3.11.1E" }, { "status": "affected", "version": "3.11.2E" }, { "status": "affected", "version": "3.11.3E" }, { "status": "affected", "version": "3.11.1aE" }, { "status": "affected", "version": "3.11.4E" }, { "status": "affected", "version": "3.11.3aE" }, { "status": "affected", "version": "3.11.5E" }, { "status": "affected", "version": "3.11.6E" }, { "status": "affected", "version": "3.11.7E" }, { "status": "affected", "version": "3.11.8E" }, { "status": "affected", "version": "3.11.9E" }, { "status": "affected", "version": "3.11.10E" }, { "status": "affected", "version": "3.11.11E" }, { "status": "affected", "version": "3.11.12E" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "17.1.1a" }, { "status": "affected", "version": "17.1.1s" }, { "status": "affected", "version": "17.1.1t" }, { "status": "affected", "version": "17.1.3" }, { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1r" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.2.1v" }, { "status": "affected", "version": "17.2.2" }, { "status": "affected", "version": "17.2.3" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "17.3.1w" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.1x" }, { "status": "affected", "version": "17.3.1z" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.4.2a" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.1w" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "17.6.1x" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.1z" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.1z1" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.6.8a" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "17.7.1b" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1a" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.1w" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.9.1x" }, { "status": "affected", "version": "17.9.1y" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.9.1x1" }, { "status": "affected", "version": "17.9.3a" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.1y1" }, { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.9.5a" }, { "status": "affected", "version": "17.9.5b" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.9.7" }, { "status": "affected", "version": "17.9.5e" }, { "status": "affected", "version": "17.9.5f" }, { "status": "affected", "version": "17.9.7a" }, { "status": "affected", "version": "17.9.7b" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.1w" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.12.1x" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.2a" }, { "status": "affected", "version": "17.12.1y" }, { "status": "affected", "version": "17.12.1z" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.1z1" }, { "status": "affected", "version": "17.12.1z2" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.12.5" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.12.1z3" }, { "status": "affected", "version": "17.12.5a" }, { "status": "affected", "version": "17.12.1z4" }, { "status": "affected", "version": "17.12.5b" }, { "status": "affected", "version": "17.12.5c" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.13.1a" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.14.1a" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.1w" }, { "status": "affected", "version": "17.15.1a" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.1b" }, { "status": "affected", "version": "17.15.1x" }, { "status": "affected", "version": "17.15.1z" }, { "status": "affected", "version": "17.15.3" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.1y" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.15.3a" }, { "status": "affected", "version": "17.15.4" }, { "status": "affected", "version": "17.15.3b" }, { "status": "affected", "version": "17.16.1" }, { "status": "affected", "version": "17.16.1a" }, { "status": "affected", "version": "17.17.1" }, { "status": "affected", "version": "17.18.1" } ] }, { "product": "Cisco IOS XE Catalyst SD-WAN", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "16.9.1" }, { "status": "affected", "version": "16.9.2" }, { "status": "affected", "version": "16.9.3" }, { "status": "affected", "version": "16.9.4" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "16.10.2" }, { "status": "affected", "version": "16.10.3" }, { "status": "affected", "version": "16.10.3a" }, { "status": "affected", "version": "16.10.3b" }, { "status": "affected", "version": "16.10.4" }, { "status": "affected", "version": "16.10.5" }, { "status": "affected", "version": "16.10.6" }, { "status": "affected", "version": "16.11.1a" }, { "status": "affected", "version": "16.12.1b" }, { "status": "affected", "version": "16.12.1d" }, { "status": "affected", "version": "16.12.1e" }, { "status": "affected", "version": "16.12.2r" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:\r\n\r \r An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. \r An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. \r \r An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. \r\n\r This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.\r\n\r Note: This vulnerability affects all versions of SNMP." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) became aware of successful exploitation of this vulnerability in the wild after local Administrator credentials were compromised. Cisco strongly recommends that customers upgrade to a fixed software release to remediate this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T16:18:05.082Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-snmp-x4LPhte", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte" } ], "source": { "advisory": "cisco-sa-snmp-x4LPhte", "defects": [ "CSCwq31287" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20352", "datePublished": "2025-09-24T17:10:42.891Z", "dateReserved": "2024-10-10T19:15:13.257Z", "dateUpdated": "2025-09-30T16:18:05.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20312 (GCVE-0-2025-20312)
Vulnerability from cvelistv5
Published
2025-09-24 17:11
Modified
2025-09-24 18:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper error handling when parsing a specific SNMP request. An attacker could exploit this vulnerability by sending a specific SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: 17.2.1 Version: 17.2.1r Version: 17.2.1a Version: 17.2.1v Version: 17.2.2 Version: 17.2.3 Version: 17.3.1 Version: 17.3.2 Version: 17.3.3 Version: 17.3.1a Version: 17.3.1w Version: 17.3.2a Version: 17.3.1x Version: 17.3.1z Version: 17.3.4 Version: 17.3.5 Version: 17.3.4a Version: 17.3.6 Version: 17.3.4b Version: 17.3.4c Version: 17.3.5a Version: 17.3.5b Version: 17.3.7 Version: 17.3.8 Version: 17.3.8a Version: 17.4.1 Version: 17.4.2 Version: 17.4.1a Version: 17.4.1b Version: 17.4.2a Version: 17.5.1 Version: 17.5.1a Version: 17.6.1 Version: 17.6.2 Version: 17.6.1w Version: 17.6.1a Version: 17.6.1x Version: 17.6.3 Version: 17.6.1y Version: 17.6.1z Version: 17.6.3a Version: 17.6.4 Version: 17.6.1z1 Version: 17.6.5 Version: 17.6.6 Version: 17.6.6a Version: 17.6.5a Version: 17.6.7 Version: 17.6.8 Version: 17.6.8a Version: 17.7.1 Version: 17.7.1a Version: 17.7.1b Version: 17.7.2 Version: 17.10.1 Version: 17.10.1a Version: 17.10.1b Version: 17.8.1 Version: 17.8.1a Version: 17.9.1 Version: 17.9.1w Version: 17.9.2 Version: 17.9.1a Version: 17.9.1x Version: 17.9.1y Version: 17.9.3 Version: 17.9.2a Version: 17.9.1x1 Version: 17.9.3a Version: 17.9.4 Version: 17.9.1y1 Version: 17.9.5 Version: 17.9.4a Version: 17.9.5a Version: 17.9.5b Version: 17.9.6 Version: 17.9.6a Version: 17.9.7 Version: 17.9.5e Version: 17.9.5f Version: 17.9.7a Version: 17.9.7b Version: 17.11.1 Version: 17.11.1a Version: 17.12.1 Version: 17.12.1w Version: 17.12.1a Version: 17.12.1x Version: 17.12.2 Version: 17.12.3 Version: 17.12.2a Version: 17.12.1y Version: 17.12.1z Version: 17.12.4 Version: 17.12.3a Version: 17.12.1z1 Version: 17.12.1z2 Version: 17.12.4a Version: 17.12.5 Version: 17.12.4b Version: 17.12.1z3 Version: 17.12.5a Version: 17.12.1z4 Version: 17.12.5b Version: 17.12.5c Version: 17.13.1 Version: 17.13.1a Version: 17.14.1 Version: 17.14.1a Version: 17.15.1 Version: 17.15.1w Version: 17.15.1a Version: 17.15.2 Version: 17.15.1b Version: 17.15.1x Version: 17.15.1z Version: 17.15.3 Version: 17.15.2c Version: 17.15.2a Version: 17.15.1y Version: 17.15.2b Version: 17.15.3a Version: 17.15.3b Version: 17.16.1 Version: 17.16.1a Version: 17.17.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20312", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T18:14:23.368728Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-24T18:14:37.538Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1r" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.2.1v" }, { "status": "affected", "version": "17.2.2" }, { "status": "affected", "version": "17.2.3" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "17.3.1w" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.1x" }, { "status": "affected", "version": "17.3.1z" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.4.2a" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.1w" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "17.6.1x" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.1z" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.1z1" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.6.8a" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "17.7.1b" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1a" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.1w" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.9.1x" }, { "status": "affected", "version": "17.9.1y" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.9.1x1" }, { "status": "affected", "version": "17.9.3a" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.1y1" }, { "status": "affected", "version": "17.9.5" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.9.5a" }, { "status": "affected", "version": "17.9.5b" }, { "status": "affected", "version": "17.9.6" }, { "status": "affected", "version": "17.9.6a" }, { "status": "affected", "version": "17.9.7" }, { "status": "affected", "version": "17.9.5e" }, { "status": "affected", "version": "17.9.5f" }, { "status": "affected", "version": "17.9.7a" }, { "status": "affected", "version": "17.9.7b" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.1w" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.12.1x" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.12.2a" }, { "status": "affected", "version": "17.12.1y" }, { "status": "affected", "version": "17.12.1z" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.1z1" }, { "status": "affected", "version": "17.12.1z2" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.12.5" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.12.1z3" }, { "status": "affected", "version": "17.12.5a" }, { "status": "affected", "version": "17.12.1z4" }, { "status": "affected", "version": "17.12.5b" }, { "status": "affected", "version": "17.12.5c" }, { "status": "affected", "version": "17.13.1" }, { "status": "affected", "version": "17.13.1a" }, { "status": "affected", "version": "17.14.1" }, { "status": "affected", "version": "17.14.1a" }, { "status": "affected", "version": "17.15.1" }, { "status": "affected", "version": "17.15.1w" }, { "status": "affected", "version": "17.15.1a" }, { "status": "affected", "version": "17.15.2" }, { "status": "affected", "version": "17.15.1b" }, { "status": "affected", "version": "17.15.1x" }, { "status": "affected", "version": "17.15.1z" }, { "status": "affected", "version": "17.15.3" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.15.1y" }, { "status": "affected", "version": "17.15.2b" }, { "status": "affected", "version": "17.15.3a" }, { "status": "affected", "version": "17.15.3b" }, { "status": "affected", "version": "17.16.1" }, { "status": "affected", "version": "17.16.1a" }, { "status": "affected", "version": "17.17.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper error handling when parsing a specific SNMP request. An attacker could exploit this vulnerability by sending a specific SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.\r\n\r This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-24T17:11:19.897Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-snmpwred-x3MJyf5M", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpwred-x3MJyf5M" } ], "source": { "advisory": "cisco-sa-snmpwred-x3MJyf5M", "defects": [ "CSCwp03900" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20312", "datePublished": "2025-09-24T17:11:19.897Z", "dateReserved": "2024-10-10T19:15:13.253Z", "dateUpdated": "2025-09-24T18:14:37.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…