Cisco IOS XE IKEv1 Phase 2 Param Validation DoS
CVE-2025-20192 Published on May 7, 2025
A vulnerability in the Internet Key Exchange version 1 (IKEv1) implementation of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The attacker must have valid IKEv1 VPN credentials to exploit this vulnerability. This vulnerability is due to improper validation of IKEv1 phase 2 parameters before the IPsec security association creation request is handed off to the hardware cryptographic accelerator of an affected device. An attacker could exploit this vulnerability by sending crafted IKEv1 messages to the affected device. A successful exploit could allow the attacker to cause the device to reload.
Vulnerability Analysis
CVE-2025-20192 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
Improper Handling of Undefined Values
The software does not handle or incorrectly handles when a value is not defined or supported for the associated parameter, field, or argument name.
Products Associated with CVE-2025-20192
Want to know whenever a new CVE is published for Cisco IOS XE? stack.watch will email you.
Affected Versions
Cisco IOS XE Software:- Version 3.13.0S is affected.
- Version 3.13.1S is affected.
- Version 3.13.2S is affected.
- Version 3.13.3S is affected.
- Version 3.13.4S is affected.
- Version 3.13.5S is affected.
- Version 3.13.6S is affected.
- Version 3.13.7S is affected.
- Version 3.13.6aS is affected.
- Version 3.13.8S is affected.
- Version 3.13.9S is affected.
- Version 3.13.10S is affected.
- Version 3.14.0S is affected.
- Version 3.14.1S is affected.
- Version 3.14.2S is affected.
- Version 3.14.3S is affected.
- Version 3.14.4S is affected.
- Version 3.15.0S is affected.
- Version 3.15.1S is affected.
- Version 3.15.2S is affected.
- Version 3.15.1cS is affected.
- Version 3.15.3S is affected.
- Version 3.15.4S is affected.
- Version 3.16.0S is affected.
- Version 3.16.1aS is affected.
- Version 3.16.2S is affected.
- Version 3.16.0cS is affected.
- Version 3.16.3S is affected.
- Version 3.16.4aS is affected.
- Version 3.16.4bS is affected.
- Version 3.16.5S is affected.
- Version 3.16.4dS is affected.
- Version 3.16.6S is affected.
- Version 3.16.7S is affected.
- Version 3.16.6bS is affected.
- Version 3.16.7aS is affected.
- Version 3.16.7bS is affected.
- Version 3.16.8S is affected.
- Version 3.16.9S is affected.
- Version 3.16.10S is affected.
- Version 3.17.0S is affected.
- Version 3.17.1S is affected.
- Version 3.17.2S is affected.
- Version 3.17.3S is affected.
- Version 3.17.4S is affected.
- Version 16.2.1 is affected.
- Version 16.2.2 is affected.
- Version 16.3.1 is affected.
- Version 16.3.2 is affected.
- Version 16.3.3 is affected.
- Version 16.3.1a is affected.
- Version 16.3.4 is affected.
- Version 16.3.5 is affected.
- Version 16.3.6 is affected.
- Version 16.3.7 is affected.
- Version 16.3.8 is affected.
- Version 16.3.9 is affected.
- Version 16.3.10 is affected.
- Version 16.3.11 is affected.
- Version 16.4.1 is affected.
- Version 16.4.2 is affected.
- Version 16.4.3 is affected.
- Version 16.5.1 is affected.
- Version 16.5.1b is affected.
- Version 16.5.2 is affected.
- Version 16.5.3 is affected.
- Version 3.18.2aSP is affected.
- Version 16.6.1 is affected.
- Version 16.6.2 is affected.
- Version 16.6.3 is affected.
- Version 16.6.4 is affected.
- Version 16.6.5 is affected.
- Version 16.6.6 is affected.
- Version 16.6.7 is affected.
- Version 16.6.8 is affected.
- Version 16.6.9 is affected.
- Version 16.6.10 is affected.
- Version 16.7.1 is affected.
- Version 16.7.2 is affected.
- Version 16.7.3 is affected.
- Version 16.8.1 is affected.
- Version 16.8.1s is affected.
- Version 16.8.2 is affected.
- Version 16.8.3 is affected.
- Version 16.9.1 is affected.
- Version 16.9.2 is affected.
- Version 16.9.1s is affected.
- Version 16.9.3 is affected.
- Version 16.9.4 is affected.
- Version 16.9.5 is affected.
- Version 16.9.6 is affected.
- Version 16.9.7 is affected.
- Version 16.9.8 is affected.
- Version 16.10.1 is affected.
- Version 16.10.1a is affected.
- Version 16.10.1b is affected.
- Version 16.10.1s is affected.
- Version 16.10.1e is affected.
- Version 16.10.2 is affected.
- Version 16.10.3 is affected.
- Version 16.11.1 is affected.
- Version 16.11.1a is affected.
- Version 16.11.2 is affected.
- Version 16.11.1s is affected.
- Version 16.12.1 is affected.
- Version 16.12.1s is affected.
- Version 16.12.1a is affected.
- Version 16.12.1c is affected.
- Version 16.12.2 is affected.
- Version 16.12.3 is affected.
- Version 16.12.8 is affected.
- Version 16.12.2s is affected.
- Version 16.12.4 is affected.
- Version 16.12.3s is affected.
- Version 16.12.5 is affected.
- Version 16.12.6 is affected.
- Version 16.12.7 is affected.
- Version 17.1.1 is affected.
- Version 17.1.1s is affected.
- Version 17.1.1t is affected.
- Version 17.1.3 is affected.
- Version 17.2.1 is affected.
- Version 17.2.1r is affected.
- Version 17.2.1v is affected.
- Version 17.2.2 is affected.
- Version 17.2.3 is affected.
- Version 17.3.1 is affected.
- Version 17.3.2 is affected.
- Version 17.3.3 is affected.
- Version 17.3.1a is affected.
- Version 17.3.4 is affected.
- Version 17.3.5 is affected.
- Version 17.3.4a is affected.
- Version 17.3.6 is affected.
- Version 17.3.7 is affected.
- Version 17.3.8 is affected.
- Version 17.3.8a is affected.
- Version 17.4.1 is affected.
- Version 17.4.2 is affected.
- Version 17.4.1a is affected.
- Version 17.4.1b is affected.
- Version 17.5.1 is affected.
- Version 17.5.1a is affected.
- Version 17.6.1 is affected.
- Version 17.6.2 is affected.
- Version 17.6.1a is affected.
- Version 17.6.3 is affected.
- Version 17.6.1y is affected.
- Version 17.6.3a is affected.
- Version 17.6.4 is affected.
- Version 17.6.5 is affected.
- Version 17.6.6 is affected.
- Version 17.6.6a is affected.
- Version 17.6.5a is affected.
- Version 17.6.7 is affected.
- Version 17.6.8 is affected.
- Version 17.6.8a is affected.
- Version 17.7.1 is affected.
- Version 17.7.1a is affected.
- Version 17.7.2 is affected.
- Version 17.10.1 is affected.
- Version 17.10.1a is affected.
- Version 17.8.1 is affected.
- Version 17.8.1a is affected.
- Version 17.9.1 is affected.
- Version 17.9.2 is affected.
- Version 17.9.1a is affected.
- Version 17.9.3 is affected.
- Version 17.9.2a is affected.
- Version 17.9.3a is affected.
- Version 17.9.4 is affected.
- Version 17.9.5 is affected.
- Version 17.9.4a is affected.
- Version 17.9.5a is affected.
- Version 17.9.5b is affected.
- Version 17.9.5e is affected.
- Version 17.9.5f is affected.
- Version 17.11.1 is affected.
- Version 17.11.1a is affected.
- Version 17.12.1 is affected.
- Version 17.12.1a is affected.
- Version 17.12.2 is affected.
- Version 17.12.3 is affected.
- Version 17.12.2a is affected.
- Version 17.12.3a is affected.
- Version 17.13.1 is affected.
- Version 17.13.1a is affected.
- Version 17.14.1 is affected.
- Version 17.14.1a is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.