Cisco Switches Vulnerability: The Uninvited Guest Bypassing ACLs!
Cisco’s ACL programming has a vulnerability that could let a remote attacker bypass the security on Catalyst 9500X and 9600X Series Switches. The problem arises when traffic floods from an unlearned MAC address. Cisco has patched this trick, so update your software now or risk your switch becoming a comedian’s punchline!

Hot Take:
Oh Cisco, you had one job: keep the folks out who aren’t supposed to be in! Yet, here we are, with hackers potentially waltzing through the back door thanks to a MAC address table that’s as confused as a toddler in a candy store. But hey, at least there’s an update to save the day (and our networks) from becoming cyber Swiss cheese!
Key Points:
- A vulnerability in Cisco IOS XE Software for Catalyst 9500X and 9600X Series Switches allows ACL bypass.
- The issue is triggered by unlearned MAC address traffic flooding a switch virtual interface (SVI).
- Potential for exploitation if the MAC address table is full or gets flushed.
- Cisco has released software updates and workarounds to fix the issue.
- Vulnerability affects devices with an egress ACL configured on an SVI using a vulnerable software version.
Already a member? Log in here