First published: Wed May 07 2025(Updated: )
A vulnerability in the Cisco Express Forwarding functionality of Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers with Route Switch Processor 3 (RSP3C) could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper memory management when Cisco IOS XE Software is processing Address Resolution Protocol (ARP) messages. An attacker could exploit this vulnerability by sending crafted ARP messages at a high rate over a period of time to an affected device. A successful exploit could allow the attacker to exhaust system resources, which eventually triggers a reload of the active route switch processor (RSP). If a redundant RSP is not present, the router reloads.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | ||
Cisco ASR 903 Aggregation Services Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20189 has a critical severity rating due to its potential to cause a denial of service condition.
CVE-2025-20189 affects Cisco IOS XE Software running on Cisco ASR 903 Aggregation Services Routers with Route Switch Processor 3 (RSP3C).
To fix CVE-2025-20189, apply the latest patches and updates provided by Cisco for affected devices.
CVE-2025-20189 is a denial of service (DoS) vulnerability that can be triggered by an unauthenticated, adjacent attacker.
No, CVE-2025-20189 requires adjacent access to exploit the vulnerability.