CVE Alert: CVE-2025-20340 – Cisco – Cisco IOS XR Software

CVE-2025-20340

HIGHNo exploitation known

A vulnerability in the Address Resolution Protocol (ARP) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a broadcast storm, leading to a denial of service (DoS) condition on an affected device.  This vulnerability is due to how Cisco IOS XR Software processes a high, sustained rate of ARP traffic hitting the management interface. Under certain conditions, an attacker could exploit this vulnerability by sending an excessive amount of traffic to the management interface of an affected device, overwhelming its ARP processing capabilities. A successful exploit could result in degraded device performance, loss of management connectivity, and complete unresponsiveness of the system, leading to a DoS condition.

CVSS v3.1 (7.4)
AV ADJACENT_NETWORK · AC LOW · PR NONE · UI NONE · S CHANGED
Vendor
Cisco
Product
Cisco IOS XR Software
Versions
6.5.3 | 6.5.29 | 6.5.1 | 6.6.1 | 6.5.2 | 6.5.92 | 6.5.15 | 6.6.2 | 7.0.1 | 6.6.25 | 6.5.26 | 6.6.11 | 6.5.25 | 6.5.28 | 6.5.93 | 6.6.12 | 6.5.90 | 7.0.0 | 7.1.1 | 7.0.90 | 6.6.3 | 6.7.1 | 7.0.2 | 7.1.15 | 7.2.0 | 7.2.1 | 7.1.2 | 6.7.2 | 7.0.11 | 7.0.12 | 7.0.14 | 7.1.25 | 6.6.4 | 7.2.12 | 7.3.1 | 7.1.3 | 6.7.3 | 7.4.1 | 7.2.2 | 6.7.4 | 6.5.31 | 7.3.15 | 7.3.16 | 6.8.1 | 7.4.15 | 6.5.32 | 7.3.2 | 7.5.1 | 7.4.16 | 7.3.27 | 7.6.1 | 7.5.2 | 7.8.1 | 7.6.15 | 7.5.12 | 7.8.12 | 7.3.3 | 7.7.1 | 6.8.2 | 7.3.4 | 7.4.2 | 6.7.35 | 6.9.1 | 7.6.2 | 7.5.3 | 7.7.2 | 6.9.2 | 7.9.1 | 7.10.1 | 7.8.2 | 7.5.4 | 6.5.33 | 7.8.22 | 7.7.21 | 7.9.2 | 7.3.5 | 7.5.5 | 7.11.1 | 7.9.21 | 7.10.2 | 24.1.1 | 7.6.3 | 7.3.6 | 7.5.52 | 7.11.2 | 24.2.1 | 24.1.2 | 24.2.11 | 24.3.1 | 24.4.1 | 24.2.2 | 7.8.23 | 7.11.21 | 24.2.20 | 24.3.2 | 24.4.10 | 6.5.35 | 25.1.1 | 24.4.2 | 24.3.20 | 24.4.15 | 6.5.351 | 24.3.30 | 6.5.352 | 24.4.30
CWE
CWE-400, Uncontrolled Resource Consumption
Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Published
2025-09-10T16:06:58.467Z
Updated
2025-09-10T18:31:00.589Z

AI Summary Analysis

Risk verdict

High risk of denial-of-service via ARP traffic flooding the management interface from an adjacent network; no public exploitation observed, but exposure and impact depend on reachability of the management plane.

Why this matters

An attacker on the same broadcast domain can overwhelm ARP processing, potentially isolating or degrading device management connectivity and affecting control-plane availability. In environments where management access is reachable from nearby networks, a sustained ARP flood could disrupt monitoring, remediation, and service continuity.

Most likely attack path

An attacker uses low-effort, adjacent-network access to send a high rate of ARP traffic targeting the device’s management interface. With no privileges or user interaction required, sustained traffic can exhaust ARP resources (UI and control-plane impact), causing DoS and degraded performance across dependent services.

Who is most exposed

Locations where management interfaces are exposed to adjacent networks, such as data-centre cores, service-provider edge gear, or loosely segmented enterprise networks, are most at risk. Environments with flat or poorly segmented management networks are especially vulnerable.

Detection ideas

  • Spike in ARP traffic directed at management interfaces; correlate with rising CPU/memory on affected devices.
  • Unusual ARP table churn or repeated ARP failures from multiple sources.
  • Management-interface interfaces showing saturation, high drops, or errors during bursts.
  • Anomalous NetFlow/telemetry indicating ARP storm-like patterns.
  • Logs showing rapid ARP requests/responses outside normal patterns.

Mitigation and prioritisation

  • Apply vendor-recommended patches or upgrade to fixed releases; prioritise if the management plane is reachable from adjacent networks.
  • Restrict ARP traffic to trusted sources via ACLs on edge and aggregation devices; segment management networks (VLANs, firewalls, or dedicated links).
  • Enable ARP rate-limiting and ARP inspection/validation on management interfaces.
  • Disable or tightly restrict unused management paths; implement strong network segmentation and access controls.
  • Plan tested, staged deployments with monitoring windows; establish baseline ARP activity for rapid alerting.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.