--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: The Cybersecurity Service for the Union institutions, bodies, offices and agencies title: 'Critical Vulnerability in Cisco IOS XR Software' number: '2025-010' version: '1.0' original_date: '2025-03-13' date: '2025-03-14' --- _History:_ * _14/03/2025 --- v1.0 -- Initial publication_ # Summary On March 13, 2025, CISCO released an advisory regarding a critical vulnerability identified in Cisco’s IOS XR Software [1]. It is recommended updating affected assets as soon as possible. # Technical Details The vulnerability **CVE-2025-20138**, with a CVSS score of 8.8, stems from insufficient input validation in specific CLI (Command Line Interface) commands within the 64-bit version of Cisco IOS XR Software. Attackers can exploit this by crafting malicious arguments that escalate their privileges to root level. This enables full control over the device, potentially leading to unauthorised command execution, data manipulation, or system destabilisation [2]. # Affected Products The following Cisco IOS XR 64-bit Software versions are affected by the vulnerability: - 24.1 and earlier - 24.2 before 24.2.21 - 24.3 # Recommendations CERT-EU recommends updating the affected products as soon as possible to the latest version. ## Detection To identify if this vulnerability has been exploited, monitor system logs for any unauthorised root-level command executions. # References [1] [2]