Cisco Product Security Update Advisory

Cisco Product Security Update Advisory

Overview

 

Cisco has released security updates that address vulnerabilities in Cisco products. Users of affected products are advised to update to the latest version.
 

 

Affected Products

 

CVE-2025-20311 [1] Β

 

Catalyst 9200 Series Switches, Catalyst 9300 Series Switches, Catalyst 9400 Series Switches, Catalyst 9500 Series Switches
Cloud-Managed Hybrid Operating Mode for Catalyst WLC versions: Cisco IOS XE 17.15.4 or earlier
Meraki MS390, Cisco Catalyst 9300 Series Switches: Meraki CS 17.2.2 and earlier

 

CVE-2025-20327

 

IE 2000 Series Versions: All versions
IE 3010 Series Versions: All Versions
IE 4000 Series Versions: All Versions
IE 4010 Series Versions: All Versions
IE 5000 Series versions: All versions

 

CVE-2025-20160

 

Cisco IOS, IOS XE Software versions: All versions that use TACACS+ and are missing a shared secret

 

 

CVE-2025-20334

 

Cisco IOS XE Software versions: All versions with HTTP Server feature enabled

 

CVE-2025-20315

 

1100 Integrated Services Routers (ISRs), 4000 Series ISRs, ASR 920 Series, ASR 1000 Series, Catalyst 1101 Rugged Routers, Catalyst 8000V Edge Software, Catalyst 8200/8300/8500/8500L Edge Platforms, Catalyst IR8300 Rugged Series Routers Versions: All versions with CAPWAP with NBAR enabled

 

CVE-2025-20313, CVE-2025-20314

 

1000 Series Integrated Services Routers Version: 17.8.1
1100 Terminal Services Gateways Version: 17.7.1
4000 Series Integrated Services Routers Version: 17.3.1
8100 Series Secure Routers Version: 17.15.1
8400 Series Secure Routers Version: 17.12.1
ASR 1000 Series Aggregation Services Routers Version: 17.7.1
C8375-E-G2 Platforms Version: 17.15.3
Catalyst IE3300 Rugged Series Routers Version: 17.12.1
Catalyst IR1100 Rugged Series Routers Version: 17.13.1
Catalyst IR8100 Heavy Duty Series Routers Version: 17.4.1
Catalyst IR8300 Rugged Series Routers Version: 17.7.1
Catalyst 8200 Series Edge Platforms Version: 17.8.1
Catalyst 8300 Series Edge Platforms Version: 17.8.1
Catalyst 8500L Edge Platforms Version: 17.8.1
Catalyst 9200 Series Switches Version: 17.8.1
Embedded Services 3300 Series Version: 17.12.1
VG410 Analog Voice Gateways Version: 17.17.1

 

CVE-2025-20312

 

Cisco switches version: see reference [7]

 

CVE-2025-20352

 

Cisco IOS Software, Cisco IOS XE Software Versions: All versions
Meraki MS390, Catalyst 9300 Versions: Meraki CS 17 and earlier

 

 

Resolved Vulnerabilities

 

Denial of Service Vulnerability in Cisco IOS XE Software for Catalyst 9000 Series Switches (CVE-2025-20311)
Denial of Service Vulnerability in Cisco IOS Software Industrial Ethernet Switch Device Manager (CVE-2025-20327)
Authentication Bypass Vulnerability in Cisco IOS and IOS XE Software TACACS+ (CVE-2025-20160)
Command Injection Vulnerability in Cisco IOS XE Software HTTP API (CVE-2025-20334)
Denial of Service Vulnerability in Cisco IOS XE Software Network-Based Application Recognition (CVE-2025-20315)
Secure Boot Bypass Vulnerability in Cisco IOS XE Software (CVE-2025-20313, CVE-2025-20314)
Denial of Service Vulnerability in Cisco IOS XE Software Simple Network Management Protocol (CVE-2025-20312)
Denial of Service and Remote Code Execution Vulnerability in Cisco IOS and IOS XE Software SNMP (CVE-2025-20352)

 

 

Vulnerability Patches

Vulnerability Patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

CVE-2025-20311

 

Catalyst 9200 Series Switches, Catalyst 9300 Series Switches, Catalyst 9400 Series Switches, Catalyst 9500 Series Switches
Cloud-Managed Hybrid Operating Mode for Catalyst WLC versions: Cisco IOS XE 17.15.4 or later
Meraki MS390, Cisco Catalyst 9300 Series Switches: Meraki CS 17.2.2 or later

 

CVE-2025-20327

 

See references[2] for updates

 

CVE-2025-20160

 

See reference[3] and update

 

CVE-2025-20334

 

See reference[4] and update

 

CVE-2025-20315

 

See reference[5] for updates

 

Cve-2025-20313, cve-2025-20314

 

See reference[6] for updates

 

CVE-2025-20312

 

See reference[7] and update

 

CVE-2025-20352

 

See reference[8] and update

 

 

References

 

[1] Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat9k-PtmD7b..
[2] Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-invalid-..
[3] Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-h..
[4] Cisco IOS XE Software HTTP API Command Injection Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-i..
[5] Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nbar-dos-LAv..
[6] Cisco IOS XE Software Secure Boot Bypass Vulnerabilities
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD..
[7] Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpwred-x3M..
[8] Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte