First published: Wed Mar 12 2025(Updated: )
A vulnerability in the access control list (ACL) processing in the egress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability exists because certain packets are handled incorrectly when they are received on an ingress interface on one line card and destined out of an egress interface on another line card where the egress ACL is configured. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an egress ACL on the affected device. For more information about this vulnerability, see the section of this advisory. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20145 has a high severity rating due to its potential to allow remote attackers to bypass configured access control lists.
To fix CVE-2025-20145, it is recommended to update your Cisco IOS XR Software to the latest version that addresses this vulnerability.
CVE-2025-20145 affects devices running Cisco IOS XR Software, specifically the Cisco IOS XRv 9000 series.
Yes, CVE-2025-20145 can be exploited by unauthenticated, remote attackers in the egress direction.
Currently, there are no known workarounds for CVE-2025-20145; updating the software is the primary mitigation.