Impact
The vulnerability is in the handling of an Egress Packet Network Interface (EPNI) Aligner interrupt in Cisco IOS XR Software. Corruption of packets during this interrupt can cause the network processing unit (NPU) and ASIC to stop processing, thereby preventing traffic from traversing the affected interface. This results in a persistent, heavy packet loss that manifests as a denial of service. The weakness is identified as CWE‑460, reflecting a violation of expected operating conditions.
Affected Systems
The affected products are Cisco IOS XR Software running on Cisco Network Convergence System 5500 Series with NC57 line cards and Cisco NCS 5700 routers, as well as any third‑party software compiled for IOS XR. Specific version numbers are not provided in the advisory, so any installation of the listed platforms that incorporates the vulnerable EPNI handling code remains potentially susceptible.
Risk and Exploitability
According to the advisory, the CVSS score is 6.8 and the EPSS probability is less than 1 %. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an unauthenticated remote attacker to send a continuous flow of crafted packets to the affected interface while the device is under heavy transit traffic; the attacker can then force the NPU/ASIC to halt processing. The likely attack vector is remote network traffic, inferred from the requirement to transmit specially crafted packets to the vulnerable interface. The overall risk is considered high by Cisco because the device operates in a critical network segment.
OpenCVE Enrichment