[CIVN-2025-0213] Denial of Service Vulnerability in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Denial of Service Vulnerability in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Cisco IOS XR Software
Overview
A vulnerability has been reported in Address Resolution Protocol (ARP) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a broadcast storm, leading to a denial of service (DoS) condition on an affected device.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Cisco IOS XR Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to how Cisco IOS XR Software processes a high, sustained rate of ARP traffic hitting the management interface. An attacker could exploit this vulnerability by sending an excessive amount of traffic to the management interface of an affected device, overwhelming its ARP processing capabilities.
Successful exploitation of this vulnerability could allow the attacker to degraded device performance, loss of management connectivity, and complete unresponsiveness of the system, leading to a DoS condition.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-arp-storm-EjUU55yM
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-arp-storm-EjUU55yM
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-arp-storm-EjUU55yM
CVE Name
CVE-2025-20340
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmjJZOQACgkQ3jCgcSdc
ys8dSg/7BjufGEecu4p1w1uOx+KoGybETZ9PUJn1Sl4+MACtcJhQTUAEJOwCecsW
44xlploalqXTAF977xsiZRd5UVHY0jTFbvxXlctIB1Nb8VRO6eM/5Rl+o7KAJkMp
hSKytZc9sBUNBo0/kmxafAJj3JWs5ckiEox9jd4g9vxHdY1BlE5QyR6h+zIhul7k
rps6HRk3JN914UZW5ZPmSQftnoaBkmAhEnIcfhjD+rZ1m4eFzjzs7OYm4GwIwyye
/4uVDVNRYY57GwR+4i53g3S/kIjJVlQFkix9KdfP+2H5kPosHrnyb2xxlD4BFbdl
RQpEzH4PjrZ+vVQNqZYHkNCdYbHCyn1rCgfpzkxgFKpxV3ZHqZOsrAFS10Jj38ma
Ku4rnGwlbtwHWixwPiQtxE0Ho+QPzl77pcJ6ZyJIWy6HtCMhRcsK5Kdfmsepq0Of
n7eH95K0LkmHNxCJ5ElfFLjGgnZuNl+JVqTMczGPWofTDf20EcYWCV5ndNPeyjY7
uNhIb+hQEkzSSDgp1UbhtkiMCJkWcNFdScDBMS4klcWl9Cd59CtR1Fg4voBlaYwO
iQw06NqPlCspiVuzPU2mQiciVqHG5u1+08URYV59fzXnJPNLfRR5/ou+fvCcyyAt
BeW6xBIPrpFk3ZKiTsGPaLLSZH086ACjUcdhXUBfK4sos0+TCZw=
=iPfn
—–END PGP SIGNATURE—–