First published: Wed May 07 2025(Updated: )
A vulnerability in the bootstrap loading of Cisco IOS XE Software could allow an authenticated, local attacker to write arbitrary files to an affected system. This vulnerability is due to insufficient input validation of the bootstrap file that is read by the system software when a device is first deployed in SD-WAN mode or when an administrator configures SD-Routing on the device. An attacker could exploit this vulnerability by modifying a bootstrap file generated by Cisco Catalyst SD-WAN Manager, loading it into the device flash, and then either reloading the device in a green field deployment in SD-WAN mode or configuring the device with SD-Routing. A successful exploit could allow the attacker to perform arbitrary file writes to the underlying operating system.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20155 is classified as a high-severity vulnerability.
To fix CVE-2025-20155, upgrade to a patched version of the Cisco IOS XE Software that addresses the vulnerability.
An authenticated, local attacker can exploit CVE-2025-20155 to write arbitrary files on the affected system.
CVE-2025-20155 affects devices running vulnerable versions of Cisco IOS XE Software.
CVE-2025-20155 is caused by insufficient input validation of the bootstrap file by the Cisco IOS XE Software.