Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-20177

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-12 Mar, 2025 | 16:13
Updated At-14 Mar, 2025 | 15:31
Rejected At-
Credits

Cisco IOS XR Software Image Verification Bypass Vulnerability

A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device. This vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system. Note: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:12 Mar, 2025 | 16:13
Updated At:14 Mar, 2025 | 15:31
Rejected At:
▼CVE Numbering Authority (CNA)
Cisco IOS XR Software Image Verification Bypass Vulnerability

A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device. This vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system. Note: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco IOS XR Software
Default Status
unknown
Versions
Affected
  • 7.0.1
  • 7.0.0
  • 7.1.1
  • 7.0.90
  • 6.7.1
  • 7.0.2
  • 7.1.15
  • 7.2.0
  • 7.2.1
  • 7.1.2
  • 6.7.2
  • 7.0.11
  • 7.0.12
  • 7.0.14
  • 7.1.25
  • 7.2.12
  • 7.3.1
  • 7.1.3
  • 6.7.3
  • 7.4.1
  • 7.2.2
  • 6.7.4
  • 7.3.15
  • 7.3.16
  • 6.8.1
  • 7.4.15
  • 7.3.2
  • 7.5.1
  • 7.4.16
  • 7.3.27
  • 7.6.1
  • 7.5.2
  • 7.8.1
  • 7.6.15
  • 7.5.12
  • 7.3.3
  • 7.7.1
  • 6.8.2
  • 7.3.4
  • 7.4.2
  • 6.7.35
  • 6.9.1
  • 7.6.2
  • 7.5.3
  • 7.7.2
  • 6.9.2
  • 7.9.1
  • 7.10.1
  • 7.8.2
  • 7.5.4
  • 7.8.22
  • 7.7.21
  • 7.9.2
  • 7.3.5
  • 7.5.5
  • 7.11.1
  • 7.9.21
  • 7.10.2
  • 24.1.1
  • 7.6.3
  • 7.3.6
  • 7.11.2
  • 24.2.1
  • 24.1.2
  • 24.2.11
  • 24.3.1
  • 7.8.23
Problem Types
TypeCWE IDDescription
cweCWE-274Improper Handling of Insufficient Privileges
Type: cwe
CWE ID: CWE-274
Description: Improper Handling of Insufficient Privileges
Metrics
VersionBase scoreBase severityVector
3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx
N/A
https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx
Resource: N/A
Hyperlink: https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:12 Mar, 2025 | 16:15
Updated At:06 Aug, 2025 | 17:04

A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device. This vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system. Note: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Cisco Systems, Inc.
cisco
>>ios_xr>>Versions before 7.11.21(exclusive)
cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>Versions from 24.2(inclusive) to 24.2.2(exclusive)
cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>Versions from 24.3(inclusive) to 24.3.2(exclusive)
cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>24.4
cpe:2.3:o:cisco:ios_xr:24.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8011-4g24y4h-i>>-
cpe:2.3:h:cisco:8011-4g24y4h-i:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8101-32fh>>-
cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8101-32fh-o>>-
cpe:2.3:h:cisco:8101-32fh-o:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8101-32h-o>>-
cpe:2.3:h:cisco:8101-32h-o:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8102-28fh-dpu-o>>-
cpe:2.3:h:cisco:8102-28fh-dpu-o:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8102-64h>>-
cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8102-64h-o>>-
cpe:2.3:h:cisco:8102-64h-o:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8111-32eh-o>>-
cpe:2.3:h:cisco:8111-32eh-o:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8122-64eh-o>>-
cpe:2.3:h:cisco:8122-64eh-o:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8122-64ehf-o>>-
cpe:2.3:h:cisco:8122-64ehf-o:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8201>>-
cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8201-24h8fh>>-
cpe:2.3:h:cisco:8201-24h8fh:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8201-32fh>>-
cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8201-32fh-o>>-
cpe:2.3:h:cisco:8201-32fh-o:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8202>>-
cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8202-32fh-m>>-
cpe:2.3:h:cisco:8202-32fh-m:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8212-48fh-m>>-
cpe:2.3:h:cisco:8212-48fh-m:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8404>>-
cpe:2.3:h:cisco:8404:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8501-sys-mt>>-
cpe:2.3:h:cisco:8501-sys-mt:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8608>>-
cpe:2.3:h:cisco:8608:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8700>>-
cpe:2.3:h:cisco:8700:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8711-32fh-m>>-
cpe:2.3:h:cisco:8711-32fh-m:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8712-mod-m>>-
cpe:2.3:h:cisco:8712-mod-m:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8804>>-
cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8808>>-
cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8812>>-
cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>8818>>-
cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_1010>>-
cpe:2.3:h:cisco:ncs_1010:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_1014>>-
cpe:2.3:h:cisco:ncs_1014:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-12z20g-sys-a>>-
cpe:2.3:h:cisco:ncs_540-12z20g-sys-a:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-12z20g-sys-d>>-
cpe:2.3:h:cisco:ncs_540-12z20g-sys-d:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-24q2c2dd-sys>>-
cpe:2.3:h:cisco:ncs_540-24q2c2dd-sys:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-24q8l2dd-sys>>-
cpe:2.3:h:cisco:ncs_540-24q8l2dd-sys:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-24z8q2c-sys>>-
cpe:2.3:h:cisco:ncs_540-24z8q2c-sys:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-28z4c-sys-a>>-
cpe:2.3:h:cisco:ncs_540-28z4c-sys-a:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-28z4c-sys-d>>-
cpe:2.3:h:cisco:ncs_540-28z4c-sys-d:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-6z14s-sys-d>>-
cpe:2.3:h:cisco:ncs_540-6z14s-sys-d:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-6z18g-sys-a>>-
cpe:2.3:h:cisco:ncs_540-6z18g-sys-a:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-6z18g-sys-d>>-
cpe:2.3:h:cisco:ncs_540-6z18g-sys-d:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-acc-sys>>-
cpe:2.3:h:cisco:ncs_540-acc-sys:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-fh-agg>>-
cpe:2.3:h:cisco:ncs_540-fh-agg:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540-fh-csr-sys>>-
cpe:2.3:h:cisco:ncs_540-fh-csr-sys:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540x-12z16g-sys-a>>-
cpe:2.3:h:cisco:ncs_540x-12z16g-sys-a:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540x-12z16g-sys-d>>-
cpe:2.3:h:cisco:ncs_540x-12z16g-sys-d:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540x-16z4g8q2c-a>>-
cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-a:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ncs_540x-16z4g8q2c-d>>-
cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-d:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-274Primarypsirt@cisco.com
CWE ID: CWE-274
Type: Primary
Source: psirt@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/psirt@cisco.com
Product
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvxpsirt@cisco.com
Vendor Advisory
Hyperlink: https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/
Source: psirt@cisco.com
Resource:
Product
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx
Source: psirt@cisco.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

161Records found

CVE-2021-1136
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 4.99%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:35
Updated-08 Nov, 2024 | 23:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software for Cisco 8000 Series Routers and Network Convergence System 540 Series Routers Image Verification Vulnerabilities

Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-82018808ncs_540881288188202ios_xrCisco IOS XR Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-1244
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 4.99%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:35
Updated-08 Nov, 2024 | 23:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software for Cisco 8000 Series Routers and Network Convergence System 540 Series Routers Image Verification Vulnerabilities

Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-82018808ncs_540881288188202ios_xrCisco IOS XR Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-1462
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 4.27%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 15:30
Updated-04 Aug, 2025 | 14:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Privilege Escalation Vulnerability

A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to elevate privileges on an affected system. To exploit this vulnerability, an attacker would need to have a valid Administrator account on an affected system. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to an affected system with an Administrator account and creating a malicious file, which the system would parse at a later time. A successful exploit could allow the attacker to obtain root privileges on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_sd-wan_managerCisco Catalyst SD-WAN Manager
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1382
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.14% / 34.36%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:07
Updated-08 Nov, 2024 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE SD-WAN Software Command Injection Vulnerability

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1383
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.17% / 38.71%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:07
Updated-08 Nov, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE SD-WAN Software Parameter Injection Vulnerabilities

Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges. These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeios_xe_sd-wanCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2020-3208
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.05%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:40
Updated-15 Nov, 2024 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers Image Verification Bypass Vulnerability

A vulnerability in the image verification feature of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) could allow an authenticated, local attacker to boot a malicious software image on an affected device. The vulnerability is due to insufficient access restrictions on the area of code that manages the image verification feature. An attacker could exploit this vulnerability by first authenticating to the targeted device and then logging in to the Virtual Device Server (VDS) of an affected device. The attacker could then, from the VDS shell, disable Cisco IOS Software integrity (image) verification. A successful exploit could allow the attacker to boot a malicious Cisco IOS Software image on the targeted device. To exploit this vulnerability, the attacker must have valid user credentials at privilege level 15.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios11201240829809Cisco IOS 12.2(60)EZ16
CWE ID-CWE-264
Not Available
CVE-2020-3213
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 9.54%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:41
Updated-15 Nov, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Privilege Escalation Vulnerability

A vulnerability in the ROMMON of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to those of the root user of the underlying operating system. The vulnerability is due to the ROMMON allowing for special parameters to be passed to the device at initial boot up. An attacker could exploit this vulnerability by sending parameters to the device at initial boot up. An exploit could allow the attacker to elevate from a Priv15 user to the root user and execute arbitrary commands with the privileges of the root user.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software 3.8.0S
CWE ID-CWE-264
Not Available
CVE-2020-3236
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.40%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 02:21
Updated-15 Nov, 2024 | 17:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Enterprise NFV Infrastructure Software Path Traversal Vulnerability

A vulnerability in the CLI of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to gain root shell access to the underlying operating system and overwrite or read arbitrary files. The attacker would need valid administrative credentials. This vulnerability is due to improper input validation of CLI command arguments. An attacker could exploit this vulnerability by using path traversal techniques when executing a vulnerable command. A successful exploit could allow the attacker to gain root shell access to the underlying operating system and overwrite or read arbitrary files on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-enterprise_network_function_virtualization_infrastructureCisco Enterprise NFV Infrastructure Software
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-20324
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.12%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 16:55
Updated-30 Jul, 2025 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords. This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Softwareios_xe
CWE ID-CWE-274
Improper Handling of Insufficient Privileges
CVE-2025-20156
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.9||CRITICAL
EPSS-0.19% / 40.95%
||
7 Day CHG~0.00%
Published-22 Jan, 2025 | 16:21
Updated-01 Aug, 2025 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Meeting Management Client-Server Privilege Escalation Vulnerability

A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device. This vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meeting_managementCisco Meeting Management
CWE ID-CWE-274
Improper Handling of Insufficient Privileges
CVE-2023-32494
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.87%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 12:56
Updated-08 Oct, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS, 8.0.x-9.5.x, contains an improper handling of insufficient privileges vulnerability. A local privileged attacker could potentially exploit this vulnerability, leading to elevation of privilege and affect in compliance mode also.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-274
Improper Handling of Insufficient Privileges
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found