VYPR
Medium severity5.8NVD Advisory· Published Sep 24, 2025· Updated Apr 15, 2026

CVE-2025-20339

CVE-2025-20339

Description

A vulnerability in the access control list (ACL) processing of IPv4 packets of Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL.

This vulnerability is due to the improper enforcement of the implicit deny all at the end of a configured ACL. An attacker could exploit this vulnerability by attempting to send unauthorized traffic to an interface on an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated, remote attacker can bypass IPv4 ACLs on Cisco SD-WAN vEdge Software due to improper enforcement of the implicit deny-all rule.

Vulnerability

Details

A vulnerability in the access control list (ACL) processing of IPv4 packets in Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL. The root cause is the improper enforcement of the implicit deny-all rule that should be applied at the end of every ACL. This means that traffic that should be blocked by the default deny may be permitted, effectively nullifying the ACL's intended restrictions [1].

Exploitation

An attacker can exploit this vulnerability by sending unauthorized IPv4 traffic to an interface on an affected interface. No authentication is required, and the attack can be launched remotely over the network. The vulnerability exists regardless of the device's configuration, as long as it runs a vulnerable release of Cisco SD-WAN vEdge Software [1].

Impact

Successful exploitation allows an attacker to bypass the protections provided by an ACL applied on the affected device. The overall impact is organization-specific, but it could lead to unauthorized access to network resources or services that the ACL was intended to protect [1].

Mitigation

Cisco has released software updates to address this vulnerability. Workarounds are also available. Administrators are advised to upgrade to a fixed software release as indicated in the Cisco Security Advisory [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.