This vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Ios Xr
Subscribe
Ios Xr Software
Subscribe
Ncs 540-12z20g-sys-a
Subscribe
Ncs 540-12z20g-sys-d
Subscribe
Ncs 540-24q2c2dd-sys
Subscribe
Ncs 540-24q8l2dd-sys
Subscribe
Ncs 540-24z8q2c-sys
Subscribe
Ncs 540-28z4c-sys-a
Subscribe
Ncs 540-28z4c-sys-d
Subscribe
Ncs 540-6z14s-sys-d
Subscribe
Ncs 540-6z18g-sys-a
Subscribe
Ncs 540-6z18g-sys-d
Subscribe
Ncs 540-acc-sys
Subscribe
Ncs 540-fh-agg
Subscribe
Ncs 540-fh-csr-sys
Subscribe
Ncs 540x-12z16g-sys-a
Subscribe
Ncs 540x-12z16g-sys-d
Subscribe
Ncs 540x-16z4g8q2c-a
Subscribe
Ncs 540x-16z4g8q2c-d
Subscribe
Ncs 540x-16z8q2c-d
Subscribe
Ncs 540x-4z14g2q-a
Subscribe
Ncs 540x-4z14g2q-d
Subscribe
Ncs 540x-6z18g-sys-a
Subscribe
Ncs 540x-6z18g-sys-d
Subscribe
Ncs 540x-8z16g-sys-a
Subscribe
Ncs 540x-8z16g-sys-d
Subscribe
Ncs 540x-acc-sys
Subscribe
Ncs 5501
Subscribe
Ncs 5501-se
Subscribe
Ncs 5502
Subscribe
Ncs 5502-se
Subscribe
Ncs 5504
Subscribe
Ncs 5508
Subscribe
Ncs 5516
Subscribe
Ncs 55a1-24h
Subscribe
Ncs 55a1-24q6h-s
Subscribe
Ncs 55a1-24q6h-ss
Subscribe
Ncs 55a1-36h
Subscribe
Ncs 55a1-36h-se
Subscribe
Ncs 55a1-48q6h
Subscribe
Ncs 55a2-mod-hd-s
Subscribe
Ncs 55a2-mod-s
Subscribe
Ncs 55a2-mod-se-s
Subscribe
Ncs 57b1-5dse-sys
Subscribe
Ncs 57b1-6d24-sys
Subscribe
Ncs 57c1-48q6-sys
Subscribe
Ncs 57c3-mod-sys
Subscribe
Ncs 57d2-18dd-sys
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7288 | A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms. This vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 06 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco ios Xr
Cisco ncs 540-12z20g-sys-a Cisco ncs 540-12z20g-sys-d Cisco ncs 540-24q2c2dd-sys Cisco ncs 540-24q8l2dd-sys Cisco ncs 540-24z8q2c-sys Cisco ncs 540-28z4c-sys-a Cisco ncs 540-28z4c-sys-d Cisco ncs 540-6z14s-sys-d Cisco ncs 540-6z18g-sys-a Cisco ncs 540-6z18g-sys-d Cisco ncs 540-acc-sys Cisco ncs 540-fh-agg Cisco ncs 540-fh-csr-sys Cisco ncs 540x-12z16g-sys-a Cisco ncs 540x-12z16g-sys-d Cisco ncs 540x-16z4g8q2c-a Cisco ncs 540x-16z4g8q2c-d Cisco ncs 540x-16z8q2c-d Cisco ncs 540x-4z14g2q-a Cisco ncs 540x-4z14g2q-d Cisco ncs 540x-6z18g-sys-a Cisco ncs 540x-6z18g-sys-d Cisco ncs 540x-8z16g-sys-a Cisco ncs 540x-8z16g-sys-d Cisco ncs 540x-acc-sys Cisco ncs 5501 Cisco ncs 5501-se Cisco ncs 5502 Cisco ncs 5502-se Cisco ncs 5504 Cisco ncs 5508 Cisco ncs 5516 Cisco ncs 55a1-24h Cisco ncs 55a1-24q6h-s Cisco ncs 55a1-24q6h-ss Cisco ncs 55a1-36h Cisco ncs 55a1-36h-se Cisco ncs 55a1-48q6h Cisco ncs 55a2-mod-hd-s Cisco ncs 55a2-mod-s Cisco ncs 55a2-mod-se-s Cisco ncs 57b1-5dse-sys Cisco ncs 57b1-6d24-sys Cisco ncs 57c1-48q6-sys Cisco ncs 57c3-mod-sys Cisco ncs 57d2-18dd-sys |
|
| CPEs | cpe:2.3:h:cisco:ncs_540-12z20g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-12z20g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24q2c2dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24q8l2dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24z8q2c-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-28z4c-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-28z4c-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z14s-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z18g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z18g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-acc-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-fh-agg:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-fh-csr-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-12z16g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-12z16g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z8q2c-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-4z14g2q-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-4z14g2q-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-6z18g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-6z18g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-8z16g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-8z16g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-acc-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_5504:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a1-24h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a1-24q6h-s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a1-24q6h-ss:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a1-36h-se:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a1-36h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a1-48q6h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a2-mod-hd-s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a2-mod-s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_55a2-mod-se-s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57b1-5dse-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57b1-6d24-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57c1-48q6-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57c3-mod-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57d2-18dd-sys:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco ios Xr
Cisco ncs 540-12z20g-sys-a Cisco ncs 540-12z20g-sys-d Cisco ncs 540-24q2c2dd-sys Cisco ncs 540-24q8l2dd-sys Cisco ncs 540-24z8q2c-sys Cisco ncs 540-28z4c-sys-a Cisco ncs 540-28z4c-sys-d Cisco ncs 540-6z14s-sys-d Cisco ncs 540-6z18g-sys-a Cisco ncs 540-6z18g-sys-d Cisco ncs 540-acc-sys Cisco ncs 540-fh-agg Cisco ncs 540-fh-csr-sys Cisco ncs 540x-12z16g-sys-a Cisco ncs 540x-12z16g-sys-d Cisco ncs 540x-16z4g8q2c-a Cisco ncs 540x-16z4g8q2c-d Cisco ncs 540x-16z8q2c-d Cisco ncs 540x-4z14g2q-a Cisco ncs 540x-4z14g2q-d Cisco ncs 540x-6z18g-sys-a Cisco ncs 540x-6z18g-sys-d Cisco ncs 540x-8z16g-sys-a Cisco ncs 540x-8z16g-sys-d Cisco ncs 540x-acc-sys Cisco ncs 5501 Cisco ncs 5501-se Cisco ncs 5502 Cisco ncs 5502-se Cisco ncs 5504 Cisco ncs 5508 Cisco ncs 5516 Cisco ncs 55a1-24h Cisco ncs 55a1-24q6h-s Cisco ncs 55a1-24q6h-ss Cisco ncs 55a1-36h Cisco ncs 55a1-36h-se Cisco ncs 55a1-48q6h Cisco ncs 55a2-mod-hd-s Cisco ncs 55a2-mod-s Cisco ncs 55a2-mod-se-s Cisco ncs 57b1-5dse-sys Cisco ncs 57b1-6d24-sys Cisco ncs 57c1-48q6-sys Cisco ncs 57c3-mod-sys Cisco ncs 57d2-18dd-sys |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 21 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms. This vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition. | |
| Title | Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerabillity | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-03-21T20:35:20.642Z
Reserved: 2024-10-10T19:15:13.214Z
Link: CVE-2025-20141
Updated: 2025-03-21T20:35:14.973Z
Status : Analyzed
Published: 2025-03-12T16:15:21.420
Modified: 2025-08-06T17:05:07.530
Link: CVE-2025-20141
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:07:20Z
EUVD