Home

Description

A vulnerability in the management interface access control list (ACL) processing feature in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass configured ACLs for the SSH, NetConf, and gRPC features. This vulnerability exists because management interface ACLs have not been supported on Cisco IOS XR Software Packet I/O infrastructure platforms for Linux-handled features such as SSH, NetConf, or gRPC. An attacker could exploit this vulnerability by attempting to send traffic to an affected device. A successful exploit could allow the attacker to bypass an ingress ACL that is applied on the management interface of the affected device.

PUBLISHED Reserved 2024-10-10 | Published 2025-09-10 | Updated 2025-09-10 | Assigner cisco




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Improper Access Control

Product status

Default status
unknown

6.6.1
affected

6.5.3
affected

7.0.1
affected

6.6.11
affected

6.5.1
affected

6.5.2
affected

6.6.2
affected

6.6.12
affected

6.6.25
affected

7.1.1
affected

7.0.90
affected

6.6.3
affected

7.0.2
affected

7.1.2
affected

7.2.1
affected

7.0.11
affected

7.0.12
affected

7.0.14
affected

6.6.4
affected

7.2.12
affected

7.3.1
affected

7.4.1
affected

7.2.2
affected

7.3.15
affected

7.3.16
affected

7.4.15
affected

7.3.2
affected

7.5.1
affected

7.4.16
affected

7.3.27
affected

7.6.1
affected

7.5.2
affected

7.8.1
affected

7.6.15
affected

7.5.12
affected

7.8.12
affected

7.3.4
affected

7.3.3
affected

7.4.2
affected

7.7.1
affected

7.6.2
affected

7.5.3
affected

7.7.2
affected

7.9.1
affected

7.10.1
affected

7.8.2
affected

7.5.4
affected

7.8.22
affected

7.7.21
affected

7.9.2
affected

7.3.5
affected

7.5.5
affected

7.11.1
affected

7.10.2
affected

24.1.1
affected

7.3.6
affected

7.5.52
affected

7.11.2
affected

24.2.1
affected

24.1.2
affected

24.2.11
affected

24.3.1
affected

24.4.1
affected

24.2.2
affected

7.11.21
affected

24.2.20
affected

24.3.2
affected

25.1.1
affected

24.4.2
affected

24.3.20
affected

25.1.2
affected

24.3.30
affected

24.4.30
affected

24.2.21
affected

References

sec.cloudapps.cisco.com/...ry/cisco-sa-acl-packetio-Swjhhbtz (cisco-sa-acl-packetio-Swjhhbtz)

cve.org (CVE-2025-20159)

nvd.nist.gov (CVE-2025-20159)

Download JSON