A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.
This vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.
Note: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
References
Configurations
Configuration 1 (hide)
AND |
|
History
06 Aug 2025, 17:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:ncs_540x-acc-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_1010:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32h-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57b1-5dse-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8011-4g24y4h-i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24q2c2dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-28z4c-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-28fh-dpu-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8404:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24z8q2c-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-28z4c-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z8q2c-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-4z14g2q-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-6z18g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8700:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8501-sys-mt:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8122-64eh-o:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:24.4:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z18g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57d2-18dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8111-32eh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8212-48fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8122-64ehf-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8712-mod-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-8z16g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-12z16g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z14s-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-fh-csr-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-4z14g2q-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-8z16g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57b1-6d24-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57c1-48q6-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-12z16g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_1014:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202-32fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-12z20g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z18g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-12z20g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8711-32fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24q8l2dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57c3-mod-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-24h8fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-acc-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8608:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-fh-agg:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-6z18g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:* |
|
Summary |
|
|
References | () https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/ - Product | |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx - Vendor Advisory | |
First Time |
Cisco 8201-32fh
Cisco 8712-mod-m Cisco 8122-64eh-o Cisco ncs 57c1-48q6-sys Cisco ios Xr Cisco 8202-32fh-m Cisco ncs 57d2-18dd-sys Cisco ncs 540x-8z16g-sys-a Cisco 8011-4g24y4h-i Cisco 8212-48fh-m Cisco ncs 540x-acc-sys Cisco ncs 540x-8z16g-sys-d Cisco 8808 Cisco 8812 Cisco ncs 57c3-mod-sys Cisco 8404 Cisco ncs 540x-16z8q2c-d Cisco ncs 540-12z20g-sys-a Cisco ncs 540-fh-agg Cisco 8818 Cisco 8101-32h-o Cisco ncs 540-acc-sys Cisco ncs 57b1-5dse-sys Cisco ncs 540x-16z4g8q2c-d Cisco ncs 540x-4z14g2q-a Cisco 8111-32eh-o Cisco ncs 57b1-6d24-sys Cisco 8102-64h-o Cisco 8804 Cisco ncs 540-28z4c-sys-d Cisco 8501-sys-mt Cisco ncs 1010 Cisco 8700 Cisco ncs 540-6z18g-sys-a Cisco Cisco ncs 540-6z18g-sys-d Cisco ncs 1014 Cisco ncs 540x-12z16g-sys-d Cisco ncs 540x-16z4g8q2c-a Cisco 8608 Cisco ncs 540-28z4c-sys-a Cisco 8711-32fh-m Cisco 8201-32fh-o Cisco 8201-24h8fh Cisco 8201 Cisco ncs 540x-4z14g2q-d Cisco ncs 540-fh-csr-sys Cisco ncs 540x-6z18g-sys-a Cisco 8202 Cisco ncs 540-24q8l2dd-sys Cisco ncs 540-6z14s-sys-d Cisco ncs 540-24q2c2dd-sys Cisco ncs 540-12z20g-sys-d Cisco 8102-64h Cisco ncs 540x-6z18g-sys-d Cisco 8122-64ehf-o Cisco 8102-28fh-dpu-o Cisco 8101-32fh-o Cisco 8101-32fh Cisco ncs 540-24z8q2c-sys Cisco ncs 540x-12z16g-sys-a |
12 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-12 16:15
Updated : 2025-08-06 17:04
NVD link : CVE-2025-20177
Mitre link : CVE-2025-20177
CVE.ORG link : CVE-2025-20177
JSON object : View
Products Affected
cisco
- 8122-64eh-o
- 8202-32fh-m
- 8608
- ncs_540-fh-agg
- ncs_540x-8z16g-sys-d
- ncs_57b1-6d24-sys
- 8404
- 8102-64h-o
- 8804
- ncs_540x-16z4g8q2c-d
- ncs_57d2-18dd-sys
- 8201-24h8fh
- 8201-32fh-o
- ncs_540-acc-sys
- ncs_540-12z20g-sys-d
- 8712-mod-m
- ncs_540x-12z16g-sys-d
- ncs_540-12z20g-sys-a
- ncs_540x-12z16g-sys-a
- 8102-64h
- ncs_540-24z8q2c-sys
- ncs_540x-4z14g2q-a
- ncs_57b1-5dse-sys
- 8202
- 8808
- ncs_540-28z4c-sys-d
- 8101-32fh
- ncs_540-24q8l2dd-sys
- ncs_540x-6z18g-sys-d
- ncs_540-28z4c-sys-a
- ncs_540x-8z16g-sys-a
- ncs_57c1-48q6-sys
- ncs_1014
- 8102-28fh-dpu-o
- ncs_540-6z18g-sys-a
- 8201-32fh
- 8501-sys-mt
- ncs_540-6z18g-sys-d
- ncs_540x-4z14g2q-d
- ncs_540-24q2c2dd-sys
- 8101-32fh-o
- 8101-32h-o
- 8711-32fh-m
- 8818
- 8111-32eh-o
- 8011-4g24y4h-i
- ncs_540x-acc-sys
- ncs_540x-16z8q2c-d
- 8700
- 8212-48fh-m
- 8812
- 8122-64ehf-o
- ios_xr
- ncs_540x-16z4g8q2c-a
- ncs_57c3-mod-sys
- ncs_540-6z14s-sys-d
- ncs_540-fh-csr-sys
- ncs_540x-6z18g-sys-a
- 8201
- ncs_1010
CWE
CWE-274
Improper Handling of Insufficient Privileges