Cisco IOS XR Vulnerability: The BGP Bug That Crashed the Party!
A Cisco IOS XR flaw allows unauthenticated attackers to crash the BGP process on routers with a well-aimed BGP update. If you ever wanted to take down a carrier-grade router with the precision of a pro bowler, now’s your chance—just keep your AS_CONFED_SEQUENCE under 254 or face a DoS strikeout.

Hot Take:
When it comes to network stability, it seems like Cisco’s got a case of router rage! Who knew a single BGP update could throw such a tantrum? Time to send those routers to anger management classes!
Key Points:
– Cisco’s IOS XR routers have a DoS vulnerability tracked as CVE-2025-20115.
– Vulnerability allows unauthenticated remote attackers to crash the BGP process.
– Flaw arises from memory corruption when a BGP update with 255 AS numbers is involved.
– Impacted versions include Cisco IOS XR Software Release 7.11 and earlier, 24.1 and earlier, and 24.2.
– A workaround involves limiting AS_CONFED_SEQUENCE to 254 or fewer AS numbers.