First published: Wed Sep 13 2023(Updated: )
A vulnerability in the access control list (ACL) processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.This vulnerability is due to incomplete support for this feature. An attacker
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco vulnerability cisco-sa-dnx-acl-PyzDkeYF is classified as high due to its potential for unauthorized access.
To mitigate Cisco vulnerability cisco-sa-dnx-acl-PyzDkeYF, it is recommended to upgrade to a patched version of Cisco IOS XR Software.
Cisco vulnerability cisco-sa-dnx-acl-PyzDkeYF affects devices running Cisco IOS XR Software, particularly those with MPLS interfaces.
An attacker exploiting Cisco vulnerability cisco-sa-dnx-acl-PyzDkeYF can bypass configured access control lists on affected devices.
There are no known workarounds for Cisco vulnerability cisco-sa-dnx-acl-PyzDkeYF; upgrading to a secure version is the recommended action.