Cisco Product Security Update Advisory
Overview
Cisco has released security updates that address vulnerabilities in Cisco products. Users of affected products are advised to update to the latest version.
Affected Products
CVE-2025-20311 [1] Β
Catalyst 9200 Series Switches, Catalyst 9300 Series Switches, Catalyst 9400 Series Switches, Catalyst 9500 Series Switches
Cloud-Managed Hybrid Operating Mode for Catalyst WLC versions: Cisco IOS XE 17.15.4 or earlier
Meraki MS390, Cisco Catalyst 9300 Series Switches: Meraki CS 17.2.2 and earlier
CVE-2025-20327
IE 2000 Series Versions: All versions
IE 3010 Series Versions: All Versions
IE 4000 Series Versions: All Versions
IE 4010 Series Versions: All Versions
IE 5000 Series versions: All versions
CVE-2025-20160
Cisco IOS, IOS XE Software versions: All versions that use TACACS+ and are missing a shared secret
CVE-2025-20334
Cisco IOS XE Software versions: All versions with HTTP Server feature enabled
CVE-2025-20315
1100 Integrated Services Routers (ISRs), 4000 Series ISRs, ASR 920 Series, ASR 1000 Series, Catalyst 1101 Rugged Routers, Catalyst 8000V Edge Software, Catalyst 8200/8300/8500/8500L Edge Platforms, Catalyst IR8300 Rugged Series Routers Versions: All versions with CAPWAP with NBAR enabled
CVE-2025-20313, CVE-2025-20314
1000 Series Integrated Services Routers Version: 17.8.1
1100 Terminal Services Gateways Version: 17.7.1
4000 Series Integrated Services Routers Version: 17.3.1
8100 Series Secure Routers Version: 17.15.1
8400 Series Secure Routers Version: 17.12.1
ASR 1000 Series Aggregation Services Routers Version: 17.7.1
C8375-E-G2 Platforms Version: 17.15.3
Catalyst IE3300 Rugged Series Routers Version: 17.12.1
Catalyst IR1100 Rugged Series Routers Version: 17.13.1
Catalyst IR8100 Heavy Duty Series Routers Version: 17.4.1
Catalyst IR8300 Rugged Series Routers Version: 17.7.1
Catalyst 8200 Series Edge Platforms Version: 17.8.1
Catalyst 8300 Series Edge Platforms Version: 17.8.1
Catalyst 8500L Edge Platforms Version: 17.8.1
Catalyst 9200 Series Switches Version: 17.8.1
Embedded Services 3300 Series Version: 17.12.1
VG410 Analog Voice Gateways Version: 17.17.1
CVE-2025-20312
Cisco switches version: see reference [7]
CVE-2025-20352
Cisco IOS Software, Cisco IOS XE Software Versions: All versions
Meraki MS390, Catalyst 9300 Versions: Meraki CS 17 and earlier
Resolved Vulnerabilities
Denial of Service Vulnerability in Cisco IOS XE Software for Catalyst 9000 Series Switches (CVE-2025-20311)
Denial of Service Vulnerability in Cisco IOS Software Industrial Ethernet Switch Device Manager (CVE-2025-20327)
Authentication Bypass Vulnerability in Cisco IOS and IOS XE Software TACACS+ (CVE-2025-20160)
Command Injection Vulnerability in Cisco IOS XE Software HTTP API (CVE-2025-20334)
Denial of Service Vulnerability in Cisco IOS XE Software Network-Based Application Recognition (CVE-2025-20315)
Secure Boot Bypass Vulnerability in Cisco IOS XE Software (CVE-2025-20313, CVE-2025-20314)
Denial of Service Vulnerability in Cisco IOS XE Software Simple Network Management Protocol (CVE-2025-20312)
Denial of Service and Remote Code Execution Vulnerability in Cisco IOS and IOS XE Software SNMP (CVE-2025-20352)
Vulnerability Patches
Vulnerability Patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
CVE-2025-20311
Catalyst 9200 Series Switches, Catalyst 9300 Series Switches, Catalyst 9400 Series Switches, Catalyst 9500 Series Switches
Cloud-Managed Hybrid Operating Mode for Catalyst WLC versions: Cisco IOS XE 17.15.4 or later
Meraki MS390, Cisco Catalyst 9300 Series Switches: Meraki CS 17.2.2 or later
CVE-2025-20327
See references[2] for updates
CVE-2025-20160
See reference[3] and update
CVE-2025-20334
See reference[4] and update
CVE-2025-20315
See reference[5] for updates
Cve-2025-20313, cve-2025-20314
See reference[6] for updates
CVE-2025-20312
See reference[7] and update
CVE-2025-20352
See reference[8] and update
References
[1] Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat9k-PtmD7b..
[2] Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-invalid-..
[3] Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-h..
[4] Cisco IOS XE Software HTTP API Command Injection Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-i..
[5] Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nbar-dos-LAv..
[6] Cisco IOS XE Software Secure Boot Bypass Vulnerabilities
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD..
[7] Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpwred-x3M..
[8] Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte