A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.  This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
Published 2025-02-05 17:15:24
Updated 2025-03-13 13:15:47
View at NVD,   CVE.org
Vulnerability category: Denial of service

Products affected by CVE-2025-20173

Please log in to view affected product information.

Exploit prediction scoring system (EPSS) score for CVE-2025-20173

0.16%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2025-20173

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.7
HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
N/A
N/A
Cisco:cisco-sa-snmp-dos-sdxnSUcW 2025-02-05
7.7
HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
3.1
4.0
Cisco Systems, Inc. 2025-02-05

CWE ids for CVE-2025-20173

  • An exception is thrown from a function, but it is not caught.
    Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)

References for CVE-2025-20173

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!