First published: Wed Mar 12 2025(Updated: )
A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent an affected device from processing any control plane UDP packets. This vulnerability is due to improper handling of malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to prevent the affected device from processing any control plane UDP packets, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20209 is classified as a high severity vulnerability due to its potential to disrupt critical control plane functionality.
To mitigate CVE-2025-20209, upgrade your Cisco IOS XR Software to the recommended patched version provided by Cisco.
CVE-2025-20209 affects devices running Cisco IOS XR Software, specifically impacting their IKEv2 functionality.
CVE-2025-20209 can be exploited by unauthenticated remote attackers to prevent the processing of UDP control plane packets.
CVE-2025-20209 was reported in 2025 and highlights a critical issue within the IKEv2 implementation in Cisco IOS XR Software.