Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Patches High-Severity IOS XR Vulnerabilities

Cisco Patches High-Severity IOS XR Vulnerabilities

Posted on September 11, 2025September 11, 2025 By CWS

Cisco on Wednesday launched patches for 3 vulnerabilities in IOS XR software program, as a part of its September 2025 safety advisory bundled publication.

Tracked as CVE-2025-20248 (CVSS rating of 6), the primary of the bugs is a high-severity situation within the IOS XR set up course of that might enable attackers to bypass picture signature verification.

Profitable exploitation of the flaw, Cisco explains, may result in unsigned information being added to an ISO picture, which may then be put in and activated on a tool.

Due to the potential bypass of the picture verification course of, Cisco has raised the safety affect score of the advisory from medium to excessive. 

The second IOS XR situation resolved this week is CVE-2025-20340 (CVSS rating of seven.4), a bug within the software program’s Handle Decision Protocol (ARP) implementation that could possibly be exploited by adjoining, unauthenticated attackers to trigger a denial-of-service (DoS) situation.

“This vulnerability is because of how Cisco IOS XR Software program processes a excessive, sustained price of ARP site visitors hitting the administration interface. Below sure situations, an attacker may exploit this vulnerability by sending an extreme quantity of site visitors to the administration interface of an affected gadget, overwhelming its ARP processing capabilities,” Cisco explains.

The third safety defect is a medium-severity situation in IOS XR’s ACL processing characteristic that might enable unauthenticated, distant attackers to ship site visitors to a weak gadget and bypass configured ACLs for the SSH, NetConf, and gRPC options.

Tracked as CVE-2025-20159 (CVSS rating of 5.3), the flaw exists as a result of IOS XR packet I/O infrastructure platforms for SSH, NetConf, and gRPC haven’t supported administration interface ACLs.Commercial. Scroll to proceed studying.

Cisco says it isn’t conscious of any of those vulnerabilities being exploited within the wild. Customers are suggested to use the out there patches as quickly as potential, as hackers are identified to have exploited Cisco bugs. 

Associated: Fortinet, Ivanti, Nvidia Launch Safety Updates

Associated: Apple Unveils iPhone Reminiscence Protections to Fight Refined Assaults

Associated: ICS Patch Tuesday: Rockwell Automation Leads With 8 Safety Advisories

Associated: SAP Patches Crucial NetWeaver Vulnerabilities

Security Week News Tags:Cisco, HighSeverity, IOS, Patches, Vulnerabilities

Post navigation

Previous Post: kkRAT Employs Network Communication Protocol to Steal Clipboard Contents
Next Post: New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads

Related Posts

42,000 Impacted by Ingram Micro Ransomware Attack 42,000 Impacted by Ingram Micro Ransomware Attack Security Week News
MATLAB Maker MathWorks Recovering From Ransomware Attack MATLAB Maker MathWorks Recovering From Ransomware Attack Security Week News
Possible Zero-Day Patched in SonicWall SMA Appliances Possible Zero-Day Patched in SonicWall SMA Appliances Security Week News
Critical Security Gap in PTC Software Alarms German Authorities Critical Security Gap in PTC Software Alarms German Authorities Security Week News
Critical Chrome Vulnerability Earns Researcher ,000 Critical Chrome Vulnerability Earns Researcher $43,000 Security Week News
Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark