First published: Wed Mar 12 2025(Updated: )
A vulnerability in the hybrid access control list (ACL) processing of IPv4 packets in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect handling of packets when a specific configuration of the hybrid ACL exists. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass a configured ACL on the affected device. For more information, see the section of this advisory. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20144 has been assigned a high severity rating due to its potential to allow unauthenticated remote access to bypass security controls.
To fix CVE-2025-20144, you should apply the latest patches provided by Cisco for affected versions of IOS XR Software.
CVE-2025-20144 affects multiple versions of Cisco IOS XR Software, particularly those configured with specific hybrid ACL settings.
Exploiting CVE-2025-20144 allows an attacker to bypass configured access control lists, potentially leading to unauthorized access to network resources.
No, CVE-2025-20144 can be exploited by an unauthenticated remote attacker, making it particularly dangerous.