First published: Wed Mar 12 2025(Updated: )
A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Secure Boot functionality and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device. This vulnerability is due to insufficient verification of modules in the software load process. An attacker could exploit this vulnerability by manipulating the loaded binaries to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system. Note: This vulnerability affects Cisco IOS XR Software, not the Secure Boot feature. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20143 is classified as a high severity vulnerability due to its potential to allow an attacker to bypass Secure Boot functionality.
To fix CVE-2025-20143, update to the latest version of Cisco IOS XR Software that mitigates this vulnerability.
CVE-2025-20143 affects devices running Cisco IOS XR Software that are configured with high privileges.
The impact of CVE-2025-20143 includes the potential loading of unverified software, compromising the integrity and security of affected devices.
Exploiting CVE-2025-20143 requires an authenticated, local attacker with high privileges on the affected device.