A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.
This vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.
Note: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
References
Configurations
Configuration 1 (hide)
AND |
|
History
06 Aug 2025, 17:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:8011-4g24y4h-i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32h-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202-32fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z14s-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z18g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8404:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_1010:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57d2-18dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57b1-5dse-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-28z4c-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-6z18g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8712-mod-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_1014:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24z8q2c-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-8z16g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:24.4:*:*:*:*:*:*:* cpe:2.3:h:cisco:8122-64eh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57c1-48q6-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-12z16g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8700:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-12z20g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-fh-agg:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-acc-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-28fh-dpu-o:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-4z14g2q-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57b1-6d24-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24q8l2dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8122-64ehf-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-fh-csr-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z8q2c-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-6z18g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-12z20g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24q2c2dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8501-sys-mt:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8111-32eh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-4z14g2q-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57c3-mod-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8608:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-12z16g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-28z4c-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-8z16g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-acc-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8212-48fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8711-32fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z18g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-24h8fh:-:*:*:*:*:*:*:* |
|
Summary |
|
|
First Time |
Cisco ncs 57c1-48q6-sys
Cisco 8818 Cisco ios Xr Cisco ncs 540-fh-csr-sys Cisco ncs 540-12z20g-sys-d Cisco 8101-32fh-o Cisco 8804 Cisco Cisco ncs 540x-8z16g-sys-d Cisco ncs 540x-12z16g-sys-d Cisco ncs 540-24q8l2dd-sys Cisco 8111-32eh-o Cisco ncs 540x-6z18g-sys-a Cisco 8101-32h-o Cisco 8808 Cisco ncs 1010 Cisco ncs 540-6z18g-sys-a Cisco 8202 Cisco ncs 540x-12z16g-sys-a Cisco 8122-64ehf-o Cisco 8201 Cisco ncs 540-fh-agg Cisco ncs 540-12z20g-sys-a Cisco 8712-mod-m Cisco 8201-32fh Cisco ncs 57b1-5dse-sys Cisco 8101-32fh Cisco 8711-32fh-m Cisco 8102-28fh-dpu-o Cisco 8102-64h-o Cisco ncs 540x-8z16g-sys-a Cisco 8201-32fh-o Cisco ncs 57b1-6d24-sys Cisco ncs 57c3-mod-sys Cisco 8501-sys-mt Cisco 8700 Cisco ncs 540x-acc-sys Cisco ncs 540-28z4c-sys-a Cisco ncs 1014 Cisco ncs 540-acc-sys Cisco 8201-24h8fh Cisco ncs 540-24z8q2c-sys Cisco ncs 540x-16z8q2c-d Cisco 8102-64h Cisco ncs 540x-6z18g-sys-d Cisco ncs 540-24q2c2dd-sys Cisco 8011-4g24y4h-i Cisco ncs 540x-16z4g8q2c-d Cisco 8212-48fh-m Cisco 8404 Cisco 8608 Cisco ncs 540x-4z14g2q-a Cisco 8202-32fh-m Cisco 8122-64eh-o Cisco ncs 57d2-18dd-sys Cisco ncs 540-6z14s-sys-d Cisco 8812 Cisco ncs 540x-4z14g2q-d Cisco ncs 540-28z4c-sys-d Cisco ncs 540x-16z4g8q2c-a Cisco ncs 540-6z18g-sys-d |
|
References | () https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/ - Product | |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx - Vendor Advisory |
12 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-12 16:15
Updated : 2025-08-06 17:04
NVD link : CVE-2025-20177
Mitre link : CVE-2025-20177
CVE.ORG link : CVE-2025-20177
JSON object : View
Products Affected
cisco
- 8404
- 8711-32fh-m
- ncs_540-6z18g-sys-a
- ncs_57c1-48q6-sys
- ncs_540-28z4c-sys-d
- 8212-48fh-m
- ncs_540-12z20g-sys-d
- 8111-32eh-o
- 8102-64h-o
- ncs_540-fh-csr-sys
- ncs_540x-8z16g-sys-a
- ncs_540-24z8q2c-sys
- 8608
- 8102-64h
- 8122-64ehf-o
- ios_xr
- 8011-4g24y4h-i
- ncs_540-6z14s-sys-d
- ncs_540-24q8l2dd-sys
- ncs_540x-6z18g-sys-d
- 8501-sys-mt
- ncs_540x-acc-sys
- ncs_57b1-6d24-sys
- 8201-32fh-o
- 8808
- ncs_540x-8z16g-sys-d
- ncs_540-fh-agg
- ncs_540x-12z16g-sys-a
- ncs_540x-4z14g2q-a
- 8101-32h-o
- 8201-24h8fh
- ncs_540-12z20g-sys-a
- 8102-28fh-dpu-o
- ncs_540-28z4c-sys-a
- ncs_540-6z18g-sys-d
- ncs_540-24q2c2dd-sys
- ncs_540x-16z4g8q2c-d
- ncs_540-acc-sys
- ncs_57d2-18dd-sys
- ncs_57c3-mod-sys
- 8201-32fh
- 8122-64eh-o
- 8101-32fh-o
- 8804
- 8202
- ncs_1010
- ncs_540x-4z14g2q-d
- 8700
- ncs_540x-16z4g8q2c-a
- 8812
- 8818
- 8202-32fh-m
- ncs_540x-6z18g-sys-a
- ncs_540x-16z8q2c-d
- 8101-32fh
- 8712-mod-m
- ncs_1014
- 8201
- ncs_57b1-5dse-sys
- ncs_540x-12z16g-sys-d
CWE
CWE-274
Improper Handling of Insufficient Privileges