Логотип exploitDog
bind:CVE-2025-20339
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20339

Количество 3

Количество 3

nvd логотип

CVE-2025-20339

5 месяцев назад

A vulnerability in the access control list (ACL) processing of IPv4 packets of Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the improper enforcement of the implicit deny all at the end of a configured ACL. An attacker could exploit this vulnerability by attempting to send unauthorized traffic to an interface on an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-97xx-3c9q-f5rx

5 месяцев назад

A vulnerability in the access control list (ACL) processing of IPv4 packets of Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the improper enforcement of the implicit deny all at the end of a configured ACL. An attacker could exploit this vulnerability by attempting to send unauthorized traffic to an interface on an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2025-11732

5 месяцев назад

Уязвимость компонента access control list (ACL) пакетов микропрограммного обеспечения маршрутизаторов Cisco SD-WAN vEdge, позволяющая нарушителю обойти список контроля доступа

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20339

A vulnerability in the access control list (ACL) processing of IPv4 packets of Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the improper enforcement of the implicit deny all at the end of a configured ACL. An attacker could exploit this vulnerability by attempting to send unauthorized traffic to an interface on an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.

CVSS3: 5.8
0%
Низкий
5 месяцев назад
github логотип
GHSA-97xx-3c9q-f5rx

A vulnerability in the access control list (ACL) processing of IPv4 packets of Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the improper enforcement of the implicit deny all at the end of a configured ACL. An attacker could exploit this vulnerability by attempting to send unauthorized traffic to an interface on an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.

CVSS3: 5.8
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-11732

Уязвимость компонента access control list (ACL) пакетов микропрограммного обеспечения маршрутизаторов Cisco SD-WAN vEdge, позволяющая нарушителю обойти список контроля доступа

CVSS3: 5.8
0%
Низкий
5 месяцев назад

Уязвимостей на страницу