Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20359: Buffer Under-read in Cisco Cisco Cyber Vision

0
Medium
VulnerabilityCVE-2025-20359cvecve-2025-20359
Published: Wed Oct 15 2025 (10/15/2025, 16:17:31 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Cyber Vision

Description

Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the disclosure of possible sensitive data or cause the Snort 3 Detection Engine to crash. This vulnerability is due to an error in the logic of buffer handling when the MIME fields of the HTTP header are parsed. This can result in a buffer under-read. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection that is parsed by Snort 3. A successful exploit could allow the attacker to induce one of two possible outcomes: the unexpected restarting of the Snort 3 Detection Engine, which could cause a denial of service (DoS) condition, or information disclosure of sensitive information in the Snort 3 data stream. Due to the under-read condition, it is possible that sensitive information that is not valid connection data could be returned.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/13/2026, 06:40:42 UTC

Technical Analysis

CVE-2025-20359 is a buffer under-read vulnerability in the Snort 3 HTTP Decoder component integrated within Cisco Cyber Vision products. The flaw arises from improper buffer handling logic when parsing MIME fields in HTTP headers, leading to reading memory before the buffer boundary. An attacker can exploit this remotely without authentication by sending specially crafted HTTP packets through an established connection that Snort 3 inspects. Successful exploitation can cause two main outcomes: first, the Snort 3 Detection Engine may crash unexpectedly, resulting in a denial of service (DoS) that disrupts network monitoring and threat detection capabilities; second, the under-read condition may leak sensitive information from memory that is not part of valid connection data, potentially exposing confidential data. The vulnerability affects a wide range of Cisco Cyber Vision versions from 3.0.0 up to 5.2.1, indicating a long-standing issue across multiple releases. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the vulnerability's network attack vector, no required privileges or user interaction, limited confidentiality impact, and availability impact due to DoS. No public exploits or active exploitation have been reported to date. Cisco has not provided patch links in the provided data, so organizations should monitor Cisco advisories for updates. Given Cisco Cyber Vision's role in industrial network visibility and security, this vulnerability could impact operational technology (OT) environments and critical infrastructure monitoring.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, utilities, and transportation that deploy Cisco Cyber Vision for industrial network monitoring, this vulnerability poses a risk to both operational continuity and data confidentiality. A successful DoS attack could disrupt the Snort 3 Detection Engine, impairing real-time threat detection and response capabilities, potentially allowing other attacks to go unnoticed. The information disclosure aspect, while limited, could expose sensitive operational data or network metadata, which adversaries might leverage for further attacks or industrial espionage. The broad range of affected versions increases the likelihood that many European enterprises have vulnerable deployments. Disruption of industrial monitoring tools can have cascading effects on production processes and safety systems. Additionally, the unauthenticated remote exploitability raises the threat level, as attackers do not need prior access or credentials. This vulnerability could be particularly impactful in countries with advanced industrial sectors and significant Cisco Cyber Vision adoption.

Mitigation Recommendations

Organizations should immediately inventory Cisco Cyber Vision deployments to identify affected versions. While no patch links are provided, it is critical to monitor Cisco’s official security advisories and promptly apply any released patches or updates addressing CVE-2025-20359. In the interim, network segmentation should be enforced to limit exposure of Cisco Cyber Vision systems to untrusted networks. Deploy strict ingress filtering and firewall rules to block or scrutinize suspicious HTTP traffic that could exploit the Snort 3 HTTP Decoder. Implement anomaly detection to identify unusual HTTP packet patterns targeting industrial monitoring systems. Regularly review and harden the configurations of Cisco Cyber Vision and Snort 3 components, disabling unnecessary protocols or features that parse HTTP headers if feasible. Conduct penetration testing and vulnerability scans focused on this issue to validate mitigations. Additionally, maintain robust incident response plans to quickly address potential DoS or data leakage events. Collaboration with Cisco support and threat intelligence sharing within industry sectors can enhance preparedness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.258Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efca8eed06978b6a597393

Added to database: 10/15/2025, 4:23:42 PM

Last enriched: 2/13/2026, 6:40:42 AM

Last updated: 3/25/2026, 5:40:53 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses