Cisco Switches Vulnerability: When Your ACL is More Like an “Open Door” Policy
Cisco Catalyst 1000 and 2960L Switches have a vulnerability in their ACL programming. Using both an IPv4 ACL and a dynamic ACL of IP Source Guard on the same interface is unsupported but not prevented. This could let attackers bypass security measures. No software updates are available, but workarounds exist.

Hot Take:
It seems like Cisco’s Catalyst switches have taken the word “dynamic” a tad too literally. Who knew that unsupported configurations could be the next big trend in cybersecurity vulnerabilities? It’s like the ‘diet cola’ of configurations: shouldn’t exist, but somehow, it does!
Key Points:
- Cisco’s Catalyst 1000 and 2960L Switches have a vulnerability in ACL programming.
- The issue arises when using both IPv4 ACL and dynamic ACL (IP Source Guard) on the same interface.
- Attackers can bypass configured ACLs due to this unsupported configuration.
- Cisco’s documentation now clarifies that this setup is unsupported.
- No software updates yet, but workarounds are available.
Already a member? Log in here