#VU105696 Permissions, Privileges, and Access Controls in Cisco Systems, Inc products - CVE-2025-20145


Vulnerability identifier: #VU105696

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-20145

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco IOS XR
Operating systems & Components / Operating system
8608 Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
8804 Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
8808 Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
8812 Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
8818 Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
NCS S5504
Hardware solutions / Routers & switches, VoIP, GSM, etc
NCS S5508
Hardware solutions / Routers & switches, VoIP, GSM, etc
NCS S5516
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to certain packets are handled incorrectly when they are received on an ingress interface on one line card and destined out of an egress interface on another line card where the egress access control list (ACL) is configured. A remote attacker can bypass an egress ACL on the target device.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Cisco IOS XR: 7.10 - 7.11, 24.1, 24.2

8608 Routers: All versions

8804 Routers: All versions

8808 Routers: All versions

8812 Routers: All versions

8818 Routers: All versions

NCS S5504: All versions

NCS S5508: All versions

NCS S5516: All versions


External links
https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-modular-ACL-u5MEPXMm


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability