Cisco IOS Web UI DoS via crafted URL
CVE-2025-20327 Published on September 24, 2025
A vulnerability in the web UI of Cisco IOS Software could allow an authenticated, remote attacker with low privileges to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted URL in an HTTP request. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Vulnerability Analysis
CVE-2025-20327 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
Improper Validation of Specified Type of Input
The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.
Products Associated with CVE-2025-20327
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-20327 are published in Cisco Internetwork Operating System (IOS):
Affected Versions
Cisco IOS:- Version 15.2(6)E2 is affected.
- Version 15.2(7)E is affected.
- Version 15.2(6)E2a is affected.
- Version 15.2(6)E2b is affected.
- Version 15.2(7)E1 is affected.
- Version 15.2(7)E0a is affected.
- Version 15.2(7)E0b is affected.
- Version 15.2(7)E0s is affected.
- Version 15.2(6)E3 is affected.
- Version 15.2(7)E2 is affected.
- Version 15.2(7a)E0b is affected.
- Version 15.2(7)E3 is affected.
- Version 15.2(7)E1a is affected.
- Version 15.2(7b)E0b is affected.
- Version 15.2(7)E2a is affected.
- Version 15.2(7)E4 is affected.
- Version 15.2(7)E3k is affected.
- Version 15.2(8)E is affected.
- Version 15.2(8)E1 is affected.
- Version 15.2(7)E5 is affected.
- Version 15.2(7)E6 is affected.
- Version 15.2(8)E2 is affected.
- Version 15.2(7)E7 is affected.
- Version 15.2(8)E3 is affected.
- Version 15.2(7)E8 is affected.
- Version 15.2(8)E4 is affected.
- Version 15.2(7)E9 is affected.
- Version 15.2(8)E5 is affected.
- Version 15.2(7)E10 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.