Vulnerability identifier: #VU105696
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco IOS XR
Operating systems & Components /
Operating system
8608 Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
8804 Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
8808 Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
8812 Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
8818 Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NCS S5504
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NCS S5508
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NCS S5516
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to certain packets are handled incorrectly when they are received on an ingress interface on one line card and destined out of an egress interface on another line card where the egress access control list (ACL) is configured. A remote attacker can bypass an egress ACL on the target device.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Cisco IOS XR: 7.10 - 7.11, 24.1, 24.2
8608 Routers: All versions
8804 Routers: All versions
8808 Routers: All versions
8812 Routers: All versions
8818 Routers: All versions
NCS S5504: All versions
NCS S5508: All versions
NCS S5516: All versions
External links
https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-modular-ACL-u5MEPXMm
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.