Cisco Catalyst 9500X/9600X ACL bypass via MAC flood
CVE-2025-20316 Published on September 24, 2025
A vulnerability in the access control list (ACL) programming of Cisco IOS XE Software for Cisco Catalyst 9500X and 9600X Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL on an affected device. This vulnerability is due to the flooding of traffic from an unlearned MAC address on a switch virtual interface (SVI) that has an egress ACL applied. An attacker could exploit this vulnerability by causing the VLAN to flush its MAC address table. This condition can also occur if the MAC address table is full. A successful exploit could allow the attacker to bypass an egress ACL on an affected device.
Vulnerability Analysis
CVE-2025-20316 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2025-20316 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2025-20316
Want to know whenever a new CVE is published for Cisco IOS XE? stack.watch will email you.
Affected Versions
Cisco IOS XE Software:- Version 17.7.1 is affected.
- Version 17.10.1 is affected.
- Version 17.10.1b is affected.
- Version 17.8.1 is affected.
- Version 17.9.1 is affected.
- Version 17.9.2 is affected.
- Version 17.9.3 is affected.
- Version 17.9.4 is affected.
- Version 17.9.5 is affected.
- Version 17.9.4a is affected.
- Version 17.9.6 is affected.
- Version 17.9.6a is affected.
- Version 17.9.7 is affected.
- Version 17.11.1 is affected.
- Version 17.12.1 is affected.
- Version 17.12.2 is affected.
- Version 17.12.3 is affected.
- Version 17.12.4 is affected.
- Version 17.12.5 is affected.
- Version 17.13.1 is affected.
- Version 17.14.1 is affected.
- Version 17.15.1 is affected.
- Version 17.15.2 is affected.
- Version 17.15.3 is affected.
- Version 17.15.2b is affected.
- Version 17.16.1 is affected.
- Version 17.17.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.