CVE-2025-20144

Severity CVSS v4.0:
Pending analysis
Type:
CWE-284 Improper Access Control
Publication date:
12/03/2025
Last modified:
04/08/2025

Description

A vulnerability in the hybrid access control list (ACL) processing of IPv4 packets in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.<br /> <br /> This vulnerability is due to incorrect handling of packets when a specific configuration of the hybrid ACL exists. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass a configured ACL on the affected device.<br /> For more information, see the section of this advisory.<br /> Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*