Understanding the Cisco IOS XR Vulnerability: CVE-2025-20115
https://thedefendopsdiaries.com/understanding-the-cisco-ios-xr-vulnerability-cve-2025-20115/
Understanding the Cisco IOS XR Vulnerability: CVE-2025-20115
https://thedefendopsdiaries.com/understanding-the-cisco-ios-xr-vulnerability-cve-2025-20115/
below you can see some of the community projects I created/actively maintaining: AS 112 - world wide project to sinkhole RFC 1918 DNS traffic locally within countries/geos and avoid slamming DNS root servers; I’m maintaining three AS112 servers in different parts of Poland BGP Blackholing - open BGP route server project, that provides “bogons” feed via dynamic BGP peering BGP Full Feed - open BGP route server that provides full DFZ view of IPv4/IPv6 BGP table
those of you working on a daily basis with configuration and reconfiguration of network devices are likely to hit various caveats and surprises. sometimes, we hit problems that take hours to troubleshoot. route? what route? we’re adding new router. it has address of 172.16.0.11 that’s defined on Loopback0. this interface and all other physical interfaces of new router are included in area 0 of OSPF. neighbors see it that way as well:
what it’s all about? in the internet, not all IPv4 and IPv6 prefixes will be sources or destinations of traffic you’d like to have anything common with. some of them will be used or controlled by bad actors that can try to compromise your network (you have been likely selected at random, do not flatter yourself) or other evil goals. why would you like to receive that traffic? or send traffic towards them?
what it’s all about? in the internet, not all IPv4 and IPv6 prefixes will be sources or destinations of traffic you’d like to have anything common with. some of them will be used or controlled by bad actors that can try to compromise your network (you have been likely selected at random, do not flatter yourself) or other evil goals. why would you like to receive that traffic? or send traffic towards them?