Image Verification Bypass in Cisco IOS XR



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-20177
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Cisco IOS XR
Operating systems & Components / Operating system

Cisco 8000 Series Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 5700 Series Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS540
Hardware solutions / Firmware

NCS 1010
Hardware solutions / Firmware

NCS 1014
Hardware solutions / Firmware

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU105699

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-20177

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to incomplete validation of files in the boot verification process. A local administrator can control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco IOS XR: - - 24.4

Cisco 8000 Series Routers: All versions

NCS540: All versions

NCS 1010: All versions

NCS 1014: All versions

NCS 5700 Series Routers: All versions

CPE2.3 External links

http://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/
http://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###