Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-20177 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Cisco IOS XR Operating systems & Components / Operating system Cisco 8000 Series Routers Hardware solutions / Routers & switches, VoIP, GSM, etc NCS 5700 Series Routers Hardware solutions / Routers & switches, VoIP, GSM, etc NCS540 Hardware solutions / Firmware NCS 1010 Hardware solutions / Firmware NCS 1014 Hardware solutions / Firmware |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU105699
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-20177
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise the target system.
The vulnerability exists due to incomplete validation of files in the boot verification process. A local administrator can control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCisco IOS XR: - - 24.4
Cisco 8000 Series Routers: All versions
NCS540: All versions
NCS 1010: All versions
NCS 1014: All versions
NCS 5700 Series Routers: All versions
CPE2.3http://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/
http://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.