7.4
CVE-2025-20141
- EPSS 0.06%
- Veröffentlicht 12.03.2025 16:12:15
- Zuletzt bearbeitet 06.08.2025 17:05:07
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms. This vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Ios Xr Version7.9.2
Cisco ≫ Ncs 540-12z20g-sys-a Version-
Cisco ≫ Ncs 540-12z20g-sys-d Version-
Cisco ≫ Ncs 540-24q2c2dd-sys Version-
Cisco ≫ Ncs 540-24q8l2dd-sys Version-
Cisco ≫ Ncs 540-24z8q2c-sys Version-
Cisco ≫ Ncs 540-28z4c-sys-a Version-
Cisco ≫ Ncs 540-28z4c-sys-d Version-
Cisco ≫ Ncs 540-6z14s-sys-d Version-
Cisco ≫ Ncs 540-6z18g-sys-a Version-
Cisco ≫ Ncs 540-6z18g-sys-d Version-
Cisco ≫ Ncs 540-acc-sys Version-
Cisco ≫ Ncs 540-fh-agg Version-
Cisco ≫ Ncs 540-fh-csr-sys Version-
Cisco ≫ Ncs 540x-12z16g-sys-a Version-
Cisco ≫ Ncs 540x-12z16g-sys-d Version-
Cisco ≫ Ncs 540x-16z4g8q2c-a Version-
Cisco ≫ Ncs 540x-16z4g8q2c-d Version-
Cisco ≫ Ncs 540x-16z8q2c-d Version-
Cisco ≫ Ncs 540x-4z14g2q-a Version-
Cisco ≫ Ncs 540x-4z14g2q-d Version-
Cisco ≫ Ncs 540x-6z18g-sys-a Version-
Cisco ≫ Ncs 540x-6z18g-sys-d Version-
Cisco ≫ Ncs 540x-8z16g-sys-a Version-
Cisco ≫ Ncs 540x-8z16g-sys-d Version-
Cisco ≫ Ncs 540x-acc-sys Version-
Cisco ≫ Ncs 5501 Version-
Cisco ≫ Ncs 5501-se Version-
Cisco ≫ Ncs 5502 Version-
Cisco ≫ Ncs 5502-se Version-
Cisco ≫ Ncs 5504 Version-
Cisco ≫ Ncs 5508 Version-
Cisco ≫ Ncs 5516 Version-
Cisco ≫ Ncs 55a1-24h Version-
Cisco ≫ Ncs 55a1-24q6h-s Version-
Cisco ≫ Ncs 55a1-24q6h-ss Version-
Cisco ≫ Ncs 55a1-36h Version-
Cisco ≫ Ncs 55a1-36h-se Version-
Cisco ≫ Ncs 55a1-48q6h Version-
Cisco ≫ Ncs 55a2-mod-hd-s Version-
Cisco ≫ Ncs 55a2-mod-s Version-
Cisco ≫ Ncs 55a2-mod-se-s Version-
Cisco ≫ Ncs 57b1-5dse-sys Version-
Cisco ≫ Ncs 57b1-6d24-sys Version-
Cisco ≫ Ncs 57c1-48q6-sys Version-
Cisco ≫ Ncs 57c3-mod-sys Version-
Cisco ≫ Ncs 57d2-18dd-sys Version-
Cisco ≫ Ncs 540-12z20g-sys-d Version-
Cisco ≫ Ncs 540-24q2c2dd-sys Version-
Cisco ≫ Ncs 540-24q8l2dd-sys Version-
Cisco ≫ Ncs 540-24z8q2c-sys Version-
Cisco ≫ Ncs 540-28z4c-sys-a Version-
Cisco ≫ Ncs 540-28z4c-sys-d Version-
Cisco ≫ Ncs 540-6z14s-sys-d Version-
Cisco ≫ Ncs 540-6z18g-sys-a Version-
Cisco ≫ Ncs 540-6z18g-sys-d Version-
Cisco ≫ Ncs 540-acc-sys Version-
Cisco ≫ Ncs 540-fh-agg Version-
Cisco ≫ Ncs 540-fh-csr-sys Version-
Cisco ≫ Ncs 540x-12z16g-sys-a Version-
Cisco ≫ Ncs 540x-12z16g-sys-d Version-
Cisco ≫ Ncs 540x-16z4g8q2c-a Version-
Cisco ≫ Ncs 540x-16z4g8q2c-d Version-
Cisco ≫ Ncs 540x-16z8q2c-d Version-
Cisco ≫ Ncs 540x-4z14g2q-a Version-
Cisco ≫ Ncs 540x-4z14g2q-d Version-
Cisco ≫ Ncs 540x-6z18g-sys-a Version-
Cisco ≫ Ncs 540x-6z18g-sys-d Version-
Cisco ≫ Ncs 540x-8z16g-sys-a Version-
Cisco ≫ Ncs 540x-8z16g-sys-d Version-
Cisco ≫ Ncs 540x-acc-sys Version-
Cisco ≫ Ncs 5501 Version-
Cisco ≫ Ncs 5501-se Version-
Cisco ≫ Ncs 5502 Version-
Cisco ≫ Ncs 5502-se Version-
Cisco ≫ Ncs 5504 Version-
Cisco ≫ Ncs 5508 Version-
Cisco ≫ Ncs 5516 Version-
Cisco ≫ Ncs 55a1-24h Version-
Cisco ≫ Ncs 55a1-24q6h-s Version-
Cisco ≫ Ncs 55a1-24q6h-ss Version-
Cisco ≫ Ncs 55a1-36h Version-
Cisco ≫ Ncs 55a1-36h-se Version-
Cisco ≫ Ncs 55a1-48q6h Version-
Cisco ≫ Ncs 55a2-mod-hd-s Version-
Cisco ≫ Ncs 55a2-mod-s Version-
Cisco ≫ Ncs 55a2-mod-se-s Version-
Cisco ≫ Ncs 57b1-5dse-sys Version-
Cisco ≫ Ncs 57b1-6d24-sys Version-
Cisco ≫ Ncs 57c1-48q6-sys Version-
Cisco ≫ Ncs 57c3-mod-sys Version-
Cisco ≫ Ncs 57d2-18dd-sys Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.172 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
psirt@cisco.com | 7.4 | 2.8 | 4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.