Логотип exploitDog
bind:CVE-2025-20159
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20159

Количество 3

Количество 3

nvd логотип

CVE-2025-20159

5 месяцев назад

A vulnerability in the management interface access control list (ACL) processing feature in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass configured ACLs for the SSH, NetConf, and gRPC features. This vulnerability exists because management interface ACLs have not been supported on Cisco IOS XR Software Packet I/O infrastructure platforms for Linux-handled features such as SSH, NetConf, or gRPC. An attacker could exploit this vulnerability by attempting to send traffic to an affected device. A successful exploit could allow the attacker to bypass an ingress ACL that is applied on the management interface of the affected device.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-6rcj-394r-r32c

5 месяцев назад

A vulnerability in the management interface access control list (ACL) processing feature in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass configured ACLs for the SSH, NetConf, and gRPC features. This vulnerability exists because management interface ACLs have not been supported on Cisco IOS XR Software Packet I/O infrastructure platforms for Linux-handled features such as SSH, NetConf, or gRPC. An attacker could exploit this vulnerability by attempting to send traffic to an affected device. A successful exploit could allow the attacker to bypass an ingress ACL that is applied on the management interface of the affected device.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2025-11354

5 месяцев назад

Уязвимость механизма списка контроля доступа ACL интерфейса управления операционной системы Cisco IOS XR, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20159

A vulnerability in the management interface access control list (ACL) processing feature in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass configured ACLs for the SSH, NetConf, and gRPC features. This vulnerability exists because management interface ACLs have not been supported on Cisco IOS XR Software Packet I/O infrastructure platforms for Linux-handled features such as SSH, NetConf, or gRPC. An attacker could exploit this vulnerability by attempting to send traffic to an affected device. A successful exploit could allow the attacker to bypass an ingress ACL that is applied on the management interface of the affected device.

CVSS3: 5.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-6rcj-394r-r32c

A vulnerability in the management interface access control list (ACL) processing feature in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass configured ACLs for the SSH, NetConf, and gRPC features. This vulnerability exists because management interface ACLs have not been supported on Cisco IOS XR Software Packet I/O infrastructure platforms for Linux-handled features such as SSH, NetConf, or gRPC. An attacker could exploit this vulnerability by attempting to send traffic to an affected device. A successful exploit could allow the attacker to bypass an ingress ACL that is applied on the management interface of the affected device.

CVSS3: 5.3
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-11354

Уязвимость механизма списка контроля доступа ACL интерфейса управления операционной системы Cisco IOS XR, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 5.3
0%
Низкий
5 месяцев назад

Уязвимостей на страницу