CVE-2025-20316
BaseFortify
Publication date: 2025-09-24
Last updated on: 2025-09-26
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | ios_xe | * |
| cisco | catalyst_9600 | * |
| cisco | catalyst_9500 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the access control list (ACL) programming of Cisco IOS XE Software for Cisco Catalyst 9500X and 9600X Series Switches. It allows an unauthenticated, remote attacker to bypass a configured ACL by flooding traffic from an unlearned MAC address on a switch virtual interface (SVI) that has an egress ACL applied. The attacker can cause the VLAN to flush its MAC address table or exploit the condition when the MAC address table is full, enabling them to bypass the egress ACL on the device.
How can this vulnerability impact me? :
The vulnerability can allow an unauthenticated, remote attacker to bypass egress ACLs on affected Cisco switches. This means the attacker could send unauthorized traffic through the device, potentially leading to unauthorized access or data leakage within the network, undermining network security controls.