First published: Wed May 07 2025(Updated: )
A vulnerability in the packet filtering features of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to bypass Layer 3 and Layer 4 traffic filters. This vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by sending a crafted packet to the affected device. A successful exploit could allow the attacker to bypass the Layer 3 and Layer 4 traffic filters and inject a crafted packet into the network.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20221 has been classified with a medium severity level, indicating it poses a moderate risk to affected systems.
To mitigate CVE-2025-20221, users should apply the relevant Cisco IOS XE SD-WAN software updates as recommended by Cisco.
CVE-2025-20221 affects Cisco IOS XE SD-WAN Software deployments that utilize vulnerable packet filtering features.
Yes, CVE-2025-20221 can be exploited by unauthenticated remote attackers to bypass Layer 3 and Layer 4 traffic filters.
CVE-2025-20221 is caused by improper traffic filtering conditions on affected devices within the Cisco IOS XE SD-WAN Software.