TROYANOSYVIRUS
Volver a CVEs

CVE-2025-20117

MEDIUM
5.1

Descripcion

A vulnerability in the CLI of Cisco APIC could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.

Detalles CVE

Puntuacion CVSS v3.15.1
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado2/26/2025
Ultima modificacion7/31/2025
Fuentenvd
Avistamientos honeypot0

Productos afectados

cisco:application_policy_infrastructure_controller

Debilidades (CWE)

CWE-77

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.