A vulnerability in the access control list (ACL) processing of IPv4 packets of Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to the improper enforcement of the implicit deny all at the end of a configured ACL. An attacker could exploit this vulnerability by attempting to send unauthorized traffic to an interface on an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
Metrics
Affected Vendors & Products
References
History
Thu, 25 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco sd-wan Vedge Cloud Cisco sd-wan Vedge Router |
|
Vendors & Products |
Cisco
Cisco sd-wan Vedge Cloud Cisco sd-wan Vedge Router |
Wed, 24 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 24 Sep 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the access control list (ACL) processing of IPv4 packets of Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the improper enforcement of the implicit deny all at the end of a configured ACL. An attacker could exploit this vulnerability by attempting to send unauthorized traffic to an interface on an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device. | |
Title | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published: 2025-09-24T16:40:27.448Z
Updated: 2025-09-24T17:04:25.755Z
Reserved: 2024-10-10T19:15:13.255Z
Link: CVE-2025-20339

Updated: 2025-09-24T17:04:18.177Z

Status : Awaiting Analysis
Published: 2025-09-24T17:15:40.523
Modified: 2025-09-24T18:11:24.520
Link: CVE-2025-20339

No data.