First published: Wed Mar 13 2024(Updated: )
Multiple vulnerabilities in the IP access control list (ACL) processing in the ingress direction on MPLS and Pseudowire (PW) interfaces of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.For more information about these vulnerabilities,
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxr-acl-bypass-RZU5NL3e is classified as high due to the potential for unauthorized access.
To fix cisco-sa-iosxr-acl-bypass-RZU5NL3e, apply the recommended software updates or patches provided by Cisco.
Yes, the vulnerability affects multiple versions of Cisco IOS XR Software deployed on MPLS and Pseudowire interfaces.
Yes, cisco-sa-iosxr-acl-bypass-RZU5NL3e can be exploited by an unauthenticated remote attacker.
The impact of cisco-sa-iosxr-acl-bypass-RZU5NL3e is that it allows unauthorized users to bypass access control lists, potentially compromising network security.