05-11-2025 05:52 AM
I am confused by the discrepancy between the Cisco security advisory cisco-sa-c2960-3560-sboot-ZtqADrHq and the bug report CSCvd75918.
The advisory lists the vulnerable products as Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches. However, the bug ID mentions Catalyst 9200, 9300, 9400, 9500, and 9600 Series Switches.
Could you please clarify which Cisco Catalyst models and versions are actually affected by this issue?
Solved! Go to Solution.
05-12-2025 02:06 AM - edited 05-12-2025 02:07 AM
Hello @dor-b
in practice... use advisories for awarness and undestanding, and Sotware Checker for validation and operational "decision-making".
Addistionaly, if you aware about that, you could integrate an open datat feeds that can help you to automate vulnerability tracking accros your network..
05-11-2025 06:52 AM
@dor-b hi, seems like mistake on the bug update. looks like this is affecting to '
05-11-2025 07:25 AM
Hello @dor-b
The c9200, 9300, 9400, 9500, and 9600 series switch are not listed as afected products in the official advisory for CVE-2025-20181. For this particular secure boot bypass vulnerability, only the 2960X/2960XR/2960CX and 3560CX models should be considered impacted.
05-11-2025 01:01 PM
Hi @dor-b,
unfortunately such documentation errors happen from time to time.
So I always double-check such issues with other tools like Cisco Software Checker which are more reliable in most cases:
Then it becomes clear that in fact the Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches are affected and the vulnerability got fixed in the meantime.
HTH!
05-12-2025 12:43 AM
Thanks to everyone who answered. I'd be happy if someone could clarify, what is the best way to track vulnerable products? Look only at advisories? Look only at the checker? Both?
05-12-2025 01:24 AM
In general, not specifically this case
05-12-2025 02:06 AM - edited 05-12-2025 02:07 AM
Hello @dor-b
in practice... use advisories for awarness and undestanding, and Sotware Checker for validation and operational "decision-making".
Addistionaly, if you aware about that, you could integrate an open datat feeds that can help you to automate vulnerability tracking accros your network..
05-12-2025 01:45 AM
Tracking the security advisories is easy so this is typically the preferred way to get notified about new vulnerabilities.
Then, if a customer decides to take action based on an advisory or in case of unclear/contradictory information like this one, it is best practice to use additional tools like the Software Checker and also check the release notes of the latest version to verify that the vulnerability got in fact closed.
Finally, the new version needs to be tested in a POC lab before getting implemented in the production network, even though I know quite a few customers that ignore this important step to save a few bucks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide