First published: Wed Sep 13 2023(Updated: )
A vulnerability in the classic access control list (ACL) compression feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass the protection that is offered by a configured ACL on an affected device.This vulnerability is due to incorrect destination
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-comp3acl-vGmp6BQ3 is considered high as it allows an unauthenticated attacker to bypass ACL protections.
To fix cisco-sa-comp3acl-vGmp6BQ3, update your Cisco IOS XR Software to the latest patched version provided by Cisco.
Devices running Cisco IOS XR Software with the classic ACL compression feature enabled are affected by cisco-sa-comp3acl-vGmp6BQ3.
The impact of cisco-sa-comp3acl-vGmp6BQ3 is that it allows attackers to bypass access controls and potentially gain unauthorized access to network resources.
No, authentication is not required to exploit cisco-sa-comp3acl-vGmp6BQ3, allowing remote attackers to exploit the vulnerability directly.