CVE-2025-20154

8.6 HIGH

📋 TL;DR

An out-of-bounds array access vulnerability in Cisco's TWAMP server implementation allows unauthenticated remote attackers to cause device reloads (DoS) by sending crafted TWAMP control packets. Affects Cisco IOS, IOS XE, and IOS XR software with TWAMP server enabled. IOS XR only vulnerable when debug mode is enabled.

💻 Affected Systems

Products:
  • Cisco IOS Software
  • Cisco IOS XE Software
  • Cisco IOS XR Software
Versions: Multiple affected versions - check Cisco advisory for specific versions
Operating Systems: Cisco IOS, Cisco IOS XE, Cisco IOS XR
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if TWAMP server feature is enabled. For IOS XR, only vulnerable when debug mode is enabled on ipsla_ippm_server process.

📦 What is this software?

Ios Xe by Cisco

Cisco IOS XE is Cisco's modern network operating system running on enterprise routers, switches, and wireless controllers deployed across corporate networks, data centers, branch offices, and service provider infrastructure worldwide. As the evolution of Cisco IOS, IOS XE provides a Linux-based modu...

Learn more about Ios Xe →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device reload causing extended network outage and service disruption

🟠

Likely Case

Intermittent device reloads causing temporary DoS until patched

🟢

If Mitigated

No impact if TWAMP server disabled or proper access controls implemented

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation possible
🏢 Internal Only: MEDIUM - Internal attackers could exploit if TWAMP server accessible

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted TWAMP control packets to vulnerable devices

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Cisco advisory for fixed releases

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-twamp-kV4FHugn

Restart Required: Yes

Instructions:

1. Review Cisco advisory for affected versions 2. Upgrade to fixed release 3. Apply patch during maintenance window 4. Verify TWAMP functionality post-upgrade

🔧 Temporary Workarounds

Disable TWAMP Server

all

Disable the TWAMP server feature if not required

no ip sla server twamp

Access Control Lists

all

Restrict access to TWAMP server using ACLs

access-list 100 deny udp any any eq 862
access-list 100 permit ip any any

🧯 If You Can't Patch

  • Disable TWAMP server feature if not required
  • Implement strict network access controls to limit TWAMP server exposure

🔍 How to Verify

Check if Vulnerable:

Check if TWAMP server is enabled: 'show ip sla server twamp' and verify IOS/IOS XE/IOS XR version against Cisco advisory

Check Version:

show version

Verify Fix Applied:

Verify upgraded to fixed version and TWAMP server functionality restored if needed

📡 Detection & Monitoring

Log Indicators:

  • Device reload messages
  • TWAMP server process crashes
  • ipsla_ippm_server process reloads (IOS XR)

Network Indicators:

  • Unusual TWAMP control packets to port 862
  • Multiple connection attempts to TWAMP server

SIEM Query:

source="cisco_router" AND (message="%SYS-5-RELOAD" OR message="%TWAMP-")

🔗 References

📤 Share & Export