First published: Wed Mar 12 2025(Updated: )
A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms. This vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20141 is rated as high severity due to the potential for an attacker to disrupt control plane traffic.
To fix CVE-2025-20141, upgrade to Cisco IOS XR Software Release 7.9.3 or later.
CVE-2025-20141 can cause control plane traffic to stop working, impacting network operations.
CVE-2025-20141 affects multiple Cisco IOS XR platforms running vulnerable versions of the software.
No, CVE-2025-20141 can be exploited by an unauthenticated, adjacent attacker.