5.3

CVE-2025-20316

A vulnerability in the access control list (ACL) programming of Cisco IOS XE Software for Cisco Catalyst 9500X and 9600X Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL on an affected device.

 This vulnerability is due to the flooding of traffic from an unlearned MAC address on a switch virtual interface (SVI) that has an egress ACL applied. An attacker could exploit this vulnerability by causing the VLAN to flush its MAC address table. This condition can also occur if the MAC address table is full. A successful exploit could allow the attacker to bypass an egress ACL on an affected device.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco IOS XE Software
Version 17.7.1
Status affected
Version 17.10.1
Status affected
Version 17.10.1b
Status affected
Version 17.8.1
Status affected
Version 17.9.1
Status affected
Version 17.9.2
Status affected
Version 17.9.3
Status affected
Version 17.9.4
Status affected
Version 17.9.5
Status affected
Version 17.9.4a
Status affected
Version 17.9.6
Status affected
Version 17.9.6a
Status affected
Version 17.9.7
Status affected
Version 17.11.1
Status affected
Version 17.12.1
Status affected
Version 17.12.2
Status affected
Version 17.12.3
Status affected
Version 17.12.4
Status affected
Version 17.12.5
Status affected
Version 17.13.1
Status affected
Version 17.14.1
Status affected
Version 17.15.1
Status affected
Version 17.15.2
Status affected
Version 17.15.3
Status affected
Version 17.15.2b
Status affected
Version 17.16.1
Status affected
Version 17.17.1
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.086
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.