Access Control Vulnerability in Cisco SD-WAN vEdge Software
CVE-2025-20339

5.8MEDIUM

Key Information:

Vendor

Cisco

Vendor
CVE Published:
24 September 2025

Badges

👾 Exploit Exists

What is CVE-2025-20339?

A significant vulnerability exists within the access control list (ACL) processing of IPv4 packets in Cisco SD-WAN vEdge Software. This flaw allows an unauthenticated, remote attacker to circumvent configured ACL rules due to improper enforcement of the implicit deny rule at the end of ACLs. An attacker can exploit this vulnerability by sending unauthorized traffic to an interface on the vulnerable device, effectively bypassing the protective measures designed to restrict access.

Affected Version(s)

Cisco SD-WAN vEdge Cloud 20.9.1

Cisco SD-WAN vEdge Cloud 20.9.1.1

Cisco SD-WAN vEdge Cloud 20.9.2

References

CVSS V3.1

Score:
5.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-20339 : Access Control Vulnerability in Cisco SD-WAN vEdge Software