7.7

CVE-2025-20192

A vulnerability in the Internet Key Exchange version 1 (IKEv1) implementation of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The attacker must have valid IKEv1 VPN credentials to exploit this vulnerability.

 This vulnerability is due to improper validation of IKEv1 phase 2 parameters before the IPsec security association creation request is handed off to the hardware cryptographic accelerator of an affected device. An attacker could exploit this vulnerability by sending crafted IKEv1 messages to the affected device. A successful exploit could allow the attacker to cause the device to reload.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco IOS XE Software
Version 3.13.0S
Status affected
Version 3.13.1S
Status affected
Version 3.13.2S
Status affected
Version 3.13.3S
Status affected
Version 3.13.4S
Status affected
Version 3.13.5S
Status affected
Version 3.13.6S
Status affected
Version 3.13.7S
Status affected
Version 3.13.6aS
Status affected
Version 3.13.8S
Status affected
Version 3.13.9S
Status affected
Version 3.13.10S
Status affected
Version 3.14.0S
Status affected
Version 3.14.1S
Status affected
Version 3.14.2S
Status affected
Version 3.14.3S
Status affected
Version 3.14.4S
Status affected
Version 3.15.0S
Status affected
Version 3.15.1S
Status affected
Version 3.15.2S
Status affected
Version 3.15.1cS
Status affected
Version 3.15.3S
Status affected
Version 3.15.4S
Status affected
Version 3.16.0S
Status affected
Version 3.16.1aS
Status affected
Version 3.16.2S
Status affected
Version 3.16.0cS
Status affected
Version 3.16.3S
Status affected
Version 3.16.4aS
Status affected
Version 3.16.4bS
Status affected
Version 3.16.5S
Status affected
Version 3.16.4dS
Status affected
Version 3.16.6S
Status affected
Version 3.16.7S
Status affected
Version 3.16.6bS
Status affected
Version 3.16.7aS
Status affected
Version 3.16.7bS
Status affected
Version 3.16.8S
Status affected
Version 3.16.9S
Status affected
Version 3.16.10S
Status affected
Version 3.17.0S
Status affected
Version 3.17.1S
Status affected
Version 3.17.2S
Status affected
Version 3.17.3S
Status affected
Version 3.17.4S
Status affected
Version 16.2.1
Status affected
Version 16.2.2
Status affected
Version 16.3.1
Status affected
Version 16.3.2
Status affected
Version 16.3.3
Status affected
Version 16.3.1a
Status affected
Version 16.3.4
Status affected
Version 16.3.5
Status affected
Version 16.3.6
Status affected
Version 16.3.7
Status affected
Version 16.3.8
Status affected
Version 16.3.9
Status affected
Version 16.3.10
Status affected
Version 16.3.11
Status affected
Version 16.4.1
Status affected
Version 16.4.2
Status affected
Version 16.4.3
Status affected
Version 16.5.1
Status affected
Version 16.5.1b
Status affected
Version 16.5.2
Status affected
Version 16.5.3
Status affected
Version 3.18.2aSP
Status affected
Version 16.6.1
Status affected
Version 16.6.2
Status affected
Version 16.6.3
Status affected
Version 16.6.4
Status affected
Version 16.6.5
Status affected
Version 16.6.6
Status affected
Version 16.6.7
Status affected
Version 16.6.8
Status affected
Version 16.6.9
Status affected
Version 16.6.10
Status affected
Version 16.7.1
Status affected
Version 16.7.2
Status affected
Version 16.7.3
Status affected
Version 16.8.1
Status affected
Version 16.8.1s
Status affected
Version 16.8.2
Status affected
Version 16.8.3
Status affected
Version 16.9.1
Status affected
Version 16.9.2
Status affected
Version 16.9.1s
Status affected
Version 16.9.3
Status affected
Version 16.9.4
Status affected
Version 16.9.5
Status affected
Version 16.9.6
Status affected
Version 16.9.7
Status affected
Version 16.9.8
Status affected
Version 16.10.1
Status affected
Version 16.10.1a
Status affected
Version 16.10.1b
Status affected
Version 16.10.1s
Status affected
Version 16.10.1e
Status affected
Version 16.10.2
Status affected
Version 16.10.3
Status affected
Version 16.11.1
Status affected
Version 16.11.1a
Status affected
Version 16.11.2
Status affected
Version 16.11.1s
Status affected
Version 16.12.1
Status affected
Version 16.12.1s
Status affected
Version 16.12.1a
Status affected
Version 16.12.1c
Status affected
Version 16.12.2
Status affected
Version 16.12.3
Status affected
Version 16.12.8
Status affected
Version 16.12.2s
Status affected
Version 16.12.4
Status affected
Version 16.12.3s
Status affected
Version 16.12.5
Status affected
Version 16.12.6
Status affected
Version 16.12.7
Status affected
Version 17.1.1
Status affected
Version 17.1.1s
Status affected
Version 17.1.1t
Status affected
Version 17.1.3
Status affected
Version 17.2.1
Status affected
Version 17.2.1r
Status affected
Version 17.2.1v
Status affected
Version 17.2.2
Status affected
Version 17.2.3
Status affected
Version 17.3.1
Status affected
Version 17.3.2
Status affected
Version 17.3.3
Status affected
Version 17.3.1a
Status affected
Version 17.3.4
Status affected
Version 17.3.5
Status affected
Version 17.3.4a
Status affected
Version 17.3.6
Status affected
Version 17.3.7
Status affected
Version 17.3.8
Status affected
Version 17.3.8a
Status affected
Version 17.4.1
Status affected
Version 17.4.2
Status affected
Version 17.4.1a
Status affected
Version 17.4.1b
Status affected
Version 17.5.1
Status affected
Version 17.5.1a
Status affected
Version 17.6.1
Status affected
Version 17.6.2
Status affected
Version 17.6.1a
Status affected
Version 17.6.3
Status affected
Version 17.6.1y
Status affected
Version 17.6.3a
Status affected
Version 17.6.4
Status affected
Version 17.6.5
Status affected
Version 17.6.6
Status affected
Version 17.6.6a
Status affected
Version 17.6.5a
Status affected
Version 17.6.7
Status affected
Version 17.6.8
Status affected
Version 17.6.8a
Status affected
Version 17.7.1
Status affected
Version 17.7.1a
Status affected
Version 17.7.2
Status affected
Version 17.10.1
Status affected
Version 17.10.1a
Status affected
Version 17.8.1
Status affected
Version 17.8.1a
Status affected
Version 17.9.1
Status affected
Version 17.9.2
Status affected
Version 17.9.1a
Status affected
Version 17.9.3
Status affected
Version 17.9.2a
Status affected
Version 17.9.3a
Status affected
Version 17.9.4
Status affected
Version 17.9.5
Status affected
Version 17.9.4a
Status affected
Version 17.9.5a
Status affected
Version 17.9.5b
Status affected
Version 17.9.5e
Status affected
Version 17.9.5f
Status affected
Version 17.11.1
Status affected
Version 17.11.1a
Status affected
Version 17.12.1
Status affected
Version 17.12.1a
Status affected
Version 17.12.2
Status affected
Version 17.12.3
Status affected
Version 17.12.2a
Status affected
Version 17.12.3a
Status affected
Version 17.13.1
Status affected
Version 17.13.1a
Status affected
Version 17.14.1
Status affected
Version 17.14.1a
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.15% 0.368
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 7.7 3.1 4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CWE-232 Improper Handling of Undefined Values

The product does not handle or incorrectly handles when a value is not defined or supported for the associated parameter, field, or argument name.