CVE-2025-20144
Severity CVSS v4.0:
Pending analysis
Type:
CWE-284
Improper Access Control
Publication date:
12/03/2025
Last modified:
04/08/2025
Description
A vulnerability in the hybrid access control list (ACL) processing of IPv4 packets in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.<br />
<br />
This vulnerability is due to incorrect handling of packets when a specific configuration of the hybrid ACL exists. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass a configured ACL on the affected device.<br />
For more information, see the section of this advisory.<br />
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
Impact
Base Score 3.x
4.00
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



