Loading

Lifecycle Services Vulnerable to Cisco CVE-2025-20352

Severity:
High
Advisory ID:
SD1750
Published Date:
October 02, 2025
Last Updated:
October 02, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
Yes
Corrected:
Yes
Workaround:
Yes
CVE IDs
CVE-2025-20352
Downloads
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
Summary

Lifecycle Services Vulnerable to Cisco CVE-2025-20352

 

Affected products and solution

Affected Product  

Affected Software Version  

Corrected in Software Version  

Industrial Data Center (IDC) with Cisco Switching

Generations 1 – 5 

Use Cisco version checker to determine fixed version to download

IDC-Managed Support contract with Cisco Switching

Generations 1 – 5

Use Cisco version checker to determine fixed version to download

Network-Managed Support contract with Cisco network switch

All  

Use Cisco version checker to determine fixed version to download

Firewall-Managed Support contract with Cisco firewall

All 

Use Cisco version checker to determine fixed version to download

 

 

Security Issue Details

Category

Details

CVE ID

CVE-2025-20352

Impact

A third-party vulnerability exists in the affected products. The affected products use Cisco IOS XE Software which contains a vulnerability in the Simple Network Management Protocol (SNMP) subsystem. An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system. Note: This vulnerability affects all versions of SNMP.

CVSS 3.1 Base Score

7.7/10

 

CVSS 4.0 Base Score

6.3/10

 

CWEs

CWE-121: Stack-based Buffer Overflow

 

Known Exploited Vulnerability

Yes (Listed in KEV Database)

 

Mitigations and Workarounds

Users with an active Rockwell Automation Infrastructure Managed Service contract:

Contact Rockwell Automation to discuss actions needed for remediation efforts.

Users without Rockwell Automation managed services contract, refer to Cisco’s workarounds below:

·         Cisco’s Workarounds

Additionally, users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.   

·         Security Best Practices

 

Revision History

Revision

Date

Description

1.0

 10/2/2025

Initial release

 

Glossary 

  • Simple Network Management Protocol (SNMP): Used for collecting and organizing information about managed devices on IP.
  • Stack overflow: A runtime error that occurs when a program uses more stack memory than is available, typically due to excessive or infinite recursion or deeply nested function calls.
  • Denial of Service (DoS): A malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of traffic or triggering a crash.
  • Cisco IOS (Internetwork Operating System): Proprietary software used on most Cisco routers and switches, providing the command-line interface and network services necessary for configuring, managing, and operating Cisco networking devices.
  • Cisco IOS XE: A modern, modular operating system built on a Linux kernel that powers Cisco enterprise networking devices, offering enhanced programmability, security, and scalability while maintaining compatibility with traditional IOS command-line interfaces..

 

Get Up-to-Date Product Security Information

Visit the Rockwell Automation security advisories on the Trust Center page to:

  • Subscribe to product security alerts
  • Review the current list of Rockwell Automation security advisories 
  • Report a possible security issue in a Rockwell Automation product
  • Learn more about the Rockwell Automation vulnerability policy

 

Support

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

 

If you have any questions regarding this disclosure, please contact PSIRT

Email: rasecure@ra.rockwell.com

 

Legal Disclaimer

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our {0} Privacy Policy
CloseClose