QID 317356

Date Published: 2023-09-20

QID 317356: Cisco Internetwork Operating System (IOS) XR Software Compression Access Control List (ACL) Bypass Vulnerability (cisco-sa-comp3acl-vGmp6BQ3)

A vulnerability in the classic access control list (ACL) compression feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass the protection that is offered by a configured ACL on an affected device.

Affected Products
Cisco IOS XR prior to 7.3.5
Cisco IOS XR 7.4 and prior to 7.5.4
Cisco IOS XR 7.6 and prior to 7.8.2
Cisco IOS XR 7.9 and prior to 7.9.1

QID Detection Logic (Authenticated):
The check matches Cisco IOS XR version retrieved via Unix Auth using "show version" command.

A successful exploit could allow the attacker to bypass configured ACL protections on the affected device, allowing the attacker to access trusted networks that the device might be protecting.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 4.9 severity.
  • Solution

    Customers are advised to refer to cisco-sa-comp3acl-vGmp6BQ3 for more information.

    CVEs related to QID 317356

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-comp3acl-vGmp6BQ3 URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-comp3acl-vGmp6BQ3