Vulnslist

find the latest Cisco vulnerabilities

Cisco IOS XR Software Compression ACL Bypass Vulnerability

cisco-sa-comp3acl-vGmp6BQ3 · Medium · Published · Updated

A vulnerability in the classic access control list (ACL) compression feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass the protection that is offered by a configured ACL on an affected device. This vulnerability is due to incorrect destination address range encoding in the compression module of an ACL that is applied to an interface of an affected device. An attacker could exploit this vulnerability by sending traffic through the affected device that should be denied by the configured ACL. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device, allowing the attacker to access trusted networks that the device might be protecting. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-comp3acl-vGmp6BQ3 This advisory is part of the September 2023 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2023 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication.

Workarounds

There is a workaround that addresses this vulnerability.

Customers are advised to review their classic ACLs if using level 2 or 3 compression for duplicate destination addresses and adjust accordingly.

While this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2023-20190
Cisco Bug IDsCSCwe08950
CVSS ScoreBase 5.8
Base 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XR Software

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2023-20190 Cisco OpenVuln
Cisco IOS Software CVE-2023-20190 Cisco OpenVuln
Cisco Catalyst PON Series Switches CVE-2023-20190 Cisco OpenVuln
Cisco IOS XR Software CVE-2023-20190 Cisco OpenVuln
Cisco IOS CVE-2023-20190 Cisco OpenVuln