Tuesday, September 16, 2025

Cisco Patched A number of IOS XR Vulnerabilities


Cisco lately addressed a number of vulnerabilities in IOS XR, considered one of which might permit picture signature verification bypass. Because the updates have been rolled out, customers should patch their gadgets with the newest updates to keep away from potential assaults.

Quite a few Cisco IOS XR Vulnerabilities Addressed

With latest updates, the networking large Cisco patched three totally different vulnerabilities affecting the IOS XR community working system. Two of those are high-severity vulnerabilities, whereas the third is a medium-severity situation. Beneath is a fast description of those three vulnerabilities.

CVE-2025-20248 (excessive severity; CVSS 6.0): This vulnerability impacted the set up technique of IOS XR, permitting an authenticated adversary to bypass picture signature verification. It existed as a consequence of incomplete file validation throughout .iso set up, permitting the attacker to load unsigned software program on the goal system. Nevertheless, exploiting the flaw required the attacker to have root entry on the goal system. To mitigate the flaw, Cisco launched further file checks in an .iso picture to stop an unsigned file set up. The agency has credited an exterior researcher (with out naming them) for reporting this situation.

CVE-2025-20340 (excessive severity; CVSS 7.4): This vulnerability, affecting the Handle Decision Protocol (ARP) implementation of IOS XR, might set off denial of service on a goal system. It existed because of the approach Cisco IOS XR software program processed excessive visitors of ARP visitors hitting the administration interface. An attacker might exploit the flaw and set off system crashes by sending an extreme quantity of visitors. Cisco confirmed that no workarounds exist to deal with the flaw; therefore, customers should improve to a hard and fast software program launch to patch the vulnerability.

CVE-2025-20159 (medium severity; CVSS 5.3): This flaw affected the administration interface entry management checklist (ACL) processing of IOS XR. Describing this flaw, Cisco said,

This vulnerability exists as a result of administration interface ACLs haven’t been supported on Cisco IOS XR Software program Packet I/O infrastructure platforms for Linux-handled options resembling SSH, NetConf, or gRPC.

An authenticated distant adversary might exploit the flaw by sending visitors to a goal susceptible system. Consequently, the attacker might bypass configured ACLs for the SSH, NetConf, and gRPC options. Whereas Cisco patched this vulnerability with the newest software program releases, they’ve additionally shared an in depth workaround within the advisory to mitigate the flaw. Therefore, for gadgets the place a right away replace will not be potential, customers could take into account making use of the workaround to stay secure.

No Lively Exploitation Detected For Any Of These Vulnerabilities

Cisco has shared the checklist of affected routers for all vulnerabilities within the respective advisories. Fortunately, the tech large confirmed that it had detected no lively exploitation makes an attempt for any of those vulnerabilities. Nonetheless, Cisco ISO XR customers ought to evaluate the advisories to verify if their gadgets are susceptible to any of those points and to deploy the mandatory patches.

Tell us your ideas within the feedback.

Get actual time replace about this put up class straight in your system, subscribe now.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com