First published: Wed Mar 12 2025(Updated: )
A vulnerability in confederation implementation for the Border Gateway Protocol (BGP) in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to a memory corruption that occurs when a BGP update is created with an AS_CONFED_SEQUENCE attribute that has 255 autonomous system numbers (AS numbers). An attacker could exploit this vulnerability by sending a crafted BGP update message, or the network could be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more. A successful exploit could allow the attacker to cause memory corruption, which may cause the BGP process to restart, resulting in a DoS condition. To exploit this vulnerability, an attacker must control a BGP confederation speaker within the same autonomous system as the victim, or the network must be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20115 has been classified as a high severity vulnerability that could lead to a denial of service condition.
To fix CVE-2025-20115, upgrade to the latest version of Cisco IOS XR Software that includes the necessary patches.
CVE-2025-20115 affects devices running Cisco IOS XR Software that implement BGP confederation.
The impact of CVE-2025-20115 is the potential for an unauthenticated remote attacker to cause a denial of service.
Yes, CVE-2025-20115 can be exploited by an unauthenticated remote attacker.