CVE-2025-20142

8.6 HIGH

📋 TL;DR

This vulnerability in Cisco IOS XR Software allows unauthenticated remote attackers to cause line card resets by sending crafted IPv4 packets to interfaces with IPv4 ACL or QoS policies applied. This results in denial of service as traffic over the affected line card is lost during reload. Organizations using Cisco ASR 9000/9900 series routers with these features enabled are affected.

💻 Affected Systems

Products:
  • Cisco ASR 9000 Series Aggregation Services Routers
  • Cisco ASR 9902 Compact High-Performance Routers
  • Cisco ASR 9903 Compact High-Performance Routers
Versions: Cisco IOS XR Software versions prior to 7.11.2
Operating Systems: Cisco IOS XR Software
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when IPv4 ACL or QoS policy is applied to interfaces. Most commonly observed in L2VPN environments with policies on bridge virtual interfaces, but Layer 3 configurations are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Multiple line cards could be simultaneously reset across multiple routers, causing widespread network outages and service disruption.

🟠

Likely Case

Targeted line card resets causing localized DoS affecting specific network segments or services, particularly in L2VPN environments.

🟢

If Mitigated

Limited to single line card impact with rapid failover to redundant paths if network architecture includes redundancy.

🌐 Internet-Facing: HIGH - Attackers can send crafted packets from the internet to vulnerable interfaces, potentially causing service disruption.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires access to vulnerable interfaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires crafting specific malformed IPv4 packets and sending them to vulnerable interfaces. No authentication needed, but attacker must reach affected interfaces.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Cisco IOS XR Software 7.11.2 or later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv4uni-LfM3cfBu

Restart Required: No

Instructions:

1. Download Cisco IOS XR Software 7.11.2 or later from Cisco Software Center. 2. Follow standard IOS XR upgrade procedures. 3. No line card or router reload required for patch application.

🔧 Temporary Workarounds

Remove IPv4 ACL/QoS policies from interfaces

all

Temporarily remove IPv4 access control lists or quality of service policies from all interfaces to eliminate attack surface.

no ipv4 access-group ACL_NAME in/out
no service-policy input/output POLICY_NAME

Implement interface filtering

all

Use infrastructure ACLs or firewall rules to restrict traffic to vulnerable interfaces from untrusted sources.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to vulnerable interfaces
  • Deploy intrusion prevention systems with signatures for malformed IPv4 packets

🔍 How to Verify

Check if Vulnerable:

Check IOS XR version with 'show version' and verify if interfaces have IPv4 ACLs or QoS policies applied using 'show running-config interface'.

Check Version:

show version | include Cisco IOS XR Software

Verify Fix Applied:

Confirm IOS XR version is 7.11.2 or later with 'show version' and verify patch is installed via 'show install active summary'.

📡 Detection & Monitoring

Log Indicators:

  • Line card reset messages in system logs
  • Network processor error messages
  • Unexpected interface state changes

Network Indicators:

  • Sudden traffic drops on specific interfaces
  • Increased packet loss on affected line cards
  • Unusual malformed IPv4 packets to router interfaces

SIEM Query:

source="router_logs" AND ("line card reset" OR "network processor error" OR "%PKT_INFRA-3-UNEXPECTED_PACKET")

🔗 References

📤 Share & Export