First published: Wed Mar 12 2025(Updated: )
A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device. This vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system. Note: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20177 is classified as a high severity vulnerability due to its potential impact on device security.
To mitigate CVE-2025-20177, upgrade to a patched version of Cisco IOS XR Software that addresses this vulnerability.
Devices running Cisco IOS XR Software, particularly versions vulnerable to this flaw, are affected by CVE-2025-20177.
CVE-2025-20177 allows an authenticated local attacker to bypass image signature verification and load unauthorized software.
Exploitation of CVE-2025-20177 requires root-system privileges on the affected device.