7.7
CVE-2025-20192
- EPSS 0.15%
- Published 07.05.2025 17:36:16
- Last modified 08.05.2025 14:39:09
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the Internet Key Exchange version 1 (IKEv1) implementation of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The attacker must have valid IKEv1 VPN credentials to exploit this vulnerability. This vulnerability is due to improper validation of IKEv1 phase 2 parameters before the IPsec security association creation request is handed off to the hardware cryptographic accelerator of an affected device. An attacker could exploit this vulnerability by sending crafted IKEv1 messages to the affected device. A successful exploit could allow the attacker to cause the device to reload.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorCisco
≫
Product
Cisco IOS XE Software
Version
3.13.0S
Status
affected
Version
3.13.1S
Status
affected
Version
3.13.2S
Status
affected
Version
3.13.3S
Status
affected
Version
3.13.4S
Status
affected
Version
3.13.5S
Status
affected
Version
3.13.6S
Status
affected
Version
3.13.7S
Status
affected
Version
3.13.6aS
Status
affected
Version
3.13.8S
Status
affected
Version
3.13.9S
Status
affected
Version
3.13.10S
Status
affected
Version
3.14.0S
Status
affected
Version
3.14.1S
Status
affected
Version
3.14.2S
Status
affected
Version
3.14.3S
Status
affected
Version
3.14.4S
Status
affected
Version
3.15.0S
Status
affected
Version
3.15.1S
Status
affected
Version
3.15.2S
Status
affected
Version
3.15.1cS
Status
affected
Version
3.15.3S
Status
affected
Version
3.15.4S
Status
affected
Version
3.16.0S
Status
affected
Version
3.16.1aS
Status
affected
Version
3.16.2S
Status
affected
Version
3.16.0cS
Status
affected
Version
3.16.3S
Status
affected
Version
3.16.4aS
Status
affected
Version
3.16.4bS
Status
affected
Version
3.16.5S
Status
affected
Version
3.16.4dS
Status
affected
Version
3.16.6S
Status
affected
Version
3.16.7S
Status
affected
Version
3.16.6bS
Status
affected
Version
3.16.7aS
Status
affected
Version
3.16.7bS
Status
affected
Version
3.16.8S
Status
affected
Version
3.16.9S
Status
affected
Version
3.16.10S
Status
affected
Version
3.17.0S
Status
affected
Version
3.17.1S
Status
affected
Version
3.17.2S
Status
affected
Version
3.17.3S
Status
affected
Version
3.17.4S
Status
affected
Version
16.2.1
Status
affected
Version
16.2.2
Status
affected
Version
16.3.1
Status
affected
Version
16.3.2
Status
affected
Version
16.3.3
Status
affected
Version
16.3.1a
Status
affected
Version
16.3.4
Status
affected
Version
16.3.5
Status
affected
Version
16.3.6
Status
affected
Version
16.3.7
Status
affected
Version
16.3.8
Status
affected
Version
16.3.9
Status
affected
Version
16.3.10
Status
affected
Version
16.3.11
Status
affected
Version
16.4.1
Status
affected
Version
16.4.2
Status
affected
Version
16.4.3
Status
affected
Version
16.5.1
Status
affected
Version
16.5.1b
Status
affected
Version
16.5.2
Status
affected
Version
16.5.3
Status
affected
Version
3.18.2aSP
Status
affected
Version
16.6.1
Status
affected
Version
16.6.2
Status
affected
Version
16.6.3
Status
affected
Version
16.6.4
Status
affected
Version
16.6.5
Status
affected
Version
16.6.6
Status
affected
Version
16.6.7
Status
affected
Version
16.6.8
Status
affected
Version
16.6.9
Status
affected
Version
16.6.10
Status
affected
Version
16.7.1
Status
affected
Version
16.7.2
Status
affected
Version
16.7.3
Status
affected
Version
16.8.1
Status
affected
Version
16.8.1s
Status
affected
Version
16.8.2
Status
affected
Version
16.8.3
Status
affected
Version
16.9.1
Status
affected
Version
16.9.2
Status
affected
Version
16.9.1s
Status
affected
Version
16.9.3
Status
affected
Version
16.9.4
Status
affected
Version
16.9.5
Status
affected
Version
16.9.6
Status
affected
Version
16.9.7
Status
affected
Version
16.9.8
Status
affected
Version
16.10.1
Status
affected
Version
16.10.1a
Status
affected
Version
16.10.1b
Status
affected
Version
16.10.1s
Status
affected
Version
16.10.1e
Status
affected
Version
16.10.2
Status
affected
Version
16.10.3
Status
affected
Version
16.11.1
Status
affected
Version
16.11.1a
Status
affected
Version
16.11.2
Status
affected
Version
16.11.1s
Status
affected
Version
16.12.1
Status
affected
Version
16.12.1s
Status
affected
Version
16.12.1a
Status
affected
Version
16.12.1c
Status
affected
Version
16.12.2
Status
affected
Version
16.12.3
Status
affected
Version
16.12.8
Status
affected
Version
16.12.2s
Status
affected
Version
16.12.4
Status
affected
Version
16.12.3s
Status
affected
Version
16.12.5
Status
affected
Version
16.12.6
Status
affected
Version
16.12.7
Status
affected
Version
17.1.1
Status
affected
Version
17.1.1s
Status
affected
Version
17.1.1t
Status
affected
Version
17.1.3
Status
affected
Version
17.2.1
Status
affected
Version
17.2.1r
Status
affected
Version
17.2.1v
Status
affected
Version
17.2.2
Status
affected
Version
17.2.3
Status
affected
Version
17.3.1
Status
affected
Version
17.3.2
Status
affected
Version
17.3.3
Status
affected
Version
17.3.1a
Status
affected
Version
17.3.4
Status
affected
Version
17.3.5
Status
affected
Version
17.3.4a
Status
affected
Version
17.3.6
Status
affected
Version
17.3.7
Status
affected
Version
17.3.8
Status
affected
Version
17.3.8a
Status
affected
Version
17.4.1
Status
affected
Version
17.4.2
Status
affected
Version
17.4.1a
Status
affected
Version
17.4.1b
Status
affected
Version
17.5.1
Status
affected
Version
17.5.1a
Status
affected
Version
17.6.1
Status
affected
Version
17.6.2
Status
affected
Version
17.6.1a
Status
affected
Version
17.6.3
Status
affected
Version
17.6.1y
Status
affected
Version
17.6.3a
Status
affected
Version
17.6.4
Status
affected
Version
17.6.5
Status
affected
Version
17.6.6
Status
affected
Version
17.6.6a
Status
affected
Version
17.6.5a
Status
affected
Version
17.6.7
Status
affected
Version
17.6.8
Status
affected
Version
17.6.8a
Status
affected
Version
17.7.1
Status
affected
Version
17.7.1a
Status
affected
Version
17.7.2
Status
affected
Version
17.10.1
Status
affected
Version
17.10.1a
Status
affected
Version
17.8.1
Status
affected
Version
17.8.1a
Status
affected
Version
17.9.1
Status
affected
Version
17.9.2
Status
affected
Version
17.9.1a
Status
affected
Version
17.9.3
Status
affected
Version
17.9.2a
Status
affected
Version
17.9.3a
Status
affected
Version
17.9.4
Status
affected
Version
17.9.5
Status
affected
Version
17.9.4a
Status
affected
Version
17.9.5a
Status
affected
Version
17.9.5b
Status
affected
Version
17.9.5e
Status
affected
Version
17.9.5f
Status
affected
Version
17.11.1
Status
affected
Version
17.11.1a
Status
affected
Version
17.12.1
Status
affected
Version
17.12.1a
Status
affected
Version
17.12.2
Status
affected
Version
17.12.3
Status
affected
Version
17.12.2a
Status
affected
Version
17.12.3a
Status
affected
Version
17.13.1
Status
affected
Version
17.13.1a
Status
affected
Version
17.14.1
Status
affected
Version
17.14.1a
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.15% | 0.368 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@cisco.com | 7.7 | 3.1 | 4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
|
CWE-232 Improper Handling of Undefined Values
The product does not handle or incorrectly handles when a value is not defined or supported for the associated parameter, field, or argument name.