cve-2025-20119
Vulnerability from cvelistv5
Published
2025-02-26 16:23
Modified
2025-03-03 19:02
Severity ?
EPSS score ?
Summary
A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Application Policy Infrastructure Controller (APIC) |
Version: 3.2(8d) Version: 3.2(1m) Version: 3.2(5e) Version: 4.1(2m) Version: 3.2(41d) Version: 3.2(3s) Version: 4.0(3c) Version: 4.1(1k) Version: 3.2(4d) Version: 4.2(2e) Version: 4.2(3j) Version: 4.2(3n) Version: 4.0(1h) Version: 4.1(1l) Version: 3.2(9f) Version: 4.2(3l) Version: 4.2(2g) Version: 3.2(7k) Version: 3.2(9b) Version: 3.2(3j) Version: 4.1(2u) Version: 4.2(1l) Version: 4.1(1a) Version: 4.0(3d) Version: 3.2(4e) Version: 4.1(1i) Version: 3.2(5f) Version: 3.2(1l) Version: 4.2(1i) Version: 4.1(2o) Version: 4.2(1g) Version: 4.1(2g) Version: 4.2(2f) Version: 3.2(6i) Version: 3.2(3i) Version: 3.2(3n) Version: 4.1(2x) Version: 3.2(5d) Version: 4.2(3q) Version: 4.1(1j) Version: 4.1(2w) Version: 3.2(2o) Version: 3.2(3r) Version: 4.0(2c) Version: 4.1(2s) Version: 3.2(7f) Version: 3.2(3o) Version: 3.2(2l) Version: 4.2(1j) Version: 4.2(4i) Version: 3.2(9h) Version: 5.0(1k) Version: 4.2(4k) Version: 5.0(1l) Version: 5.0(2e) Version: 4.2(4o) Version: 4.2(4p) Version: 5.0(2h) Version: 4.2(5k) Version: 4.2(5l) Version: 4.2(5n) Version: 5.1(1h) Version: 4.2(6d) Version: 5.1(2e) Version: 4.2(6g) Version: 4.2(6h) Version: 5.1(3e) Version: 3.2(10e) Version: 4.2(6l) Version: 4.2(7f) Version: 5.1(4c) Version: 4.2(6o) Version: 5.2(1g) Version: 5.2(2e) Version: 4.2(7l) Version: 3.2(10f) Version: 5.2(2f) Version: 5.2(2g) Version: 4.2(7q) Version: 5.2(2h) Version: 5.2(3f) Version: 5.2(3e) Version: 5.2(3g) Version: 4.2(7r) Version: 4.2(7s) Version: 5.2(4d) Version: 5.2(4e) Version: 4.2(7t) Version: 5.2(5d) Version: 3.2(10g) Version: 5.2(5c) Version: 6.0(1g) Version: 4.2(7u) Version: 5.2(5e) Version: 5.2(4f) Version: 5.2(6e) Version: 6.0(1j) Version: 5.2(6g) Version: 5.2(7f) Version: 4.2(7v) Version: 5.2(7g) Version: 6.0(2h) Version: 4.2(7w) Version: 5.2(6h) Version: 5.2(4h) Version: 5.2(8d) Version: 6.0(2j) Version: 5.2(8e) Version: 6.0(3d) Version: 6.0(3e) Version: 5.2(8f) Version: 5.2(8g) Version: 5.3(1d) Version: 5.2(8h) Version: 6.0(4c) Version: 5.3(2a) Version: 5.2(8i) Version: 6.0(5h) Version: 5.3(2b) Version: 6.0(3g) Version: 6.0(5j) Version: 5.3(2c) Version: 6.0(6c) Version: 6.1(1f) Version: 6.0(7e) Version: 5.3(2d) Version: 6.0(8d) Version: 5.3(2e) |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-20119", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-02-26T17:21:01.401418Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-03T19:02:59.455Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Application Policy Infrastructure Controller (APIC)", vendor: "Cisco", versions: [ { status: "affected", version: "3.2(8d)", }, { status: "affected", version: "3.2(1m)", }, { status: "affected", version: "3.2(5e)", }, { status: "affected", version: "4.1(2m)", }, { status: "affected", version: "3.2(41d)", }, { status: "affected", version: "3.2(3s)", }, { status: "affected", version: "4.0(3c)", }, { status: "affected", version: "4.1(1k)", }, { status: "affected", version: "3.2(4d)", }, { status: "affected", version: "4.2(2e)", }, { status: "affected", version: "4.2(3j)", }, { status: "affected", version: "4.2(3n)", }, { status: "affected", version: "4.0(1h)", }, { status: "affected", version: "4.1(1l)", }, { status: "affected", version: "3.2(9f)", }, { status: "affected", version: "4.2(3l)", }, { status: "affected", version: "4.2(2g)", }, { status: "affected", version: "3.2(7k)", }, { status: "affected", version: "3.2(9b)", }, { status: "affected", version: "3.2(3j)", }, { status: "affected", version: "4.1(2u)", }, { status: "affected", version: "4.2(1l)", }, { status: "affected", version: "4.1(1a)", }, { status: "affected", version: "4.0(3d)", }, { status: "affected", version: "3.2(4e)", }, { status: "affected", version: "4.1(1i)", }, { status: "affected", version: "3.2(5f)", }, { status: "affected", version: "3.2(1l)", }, { status: "affected", version: "4.2(1i)", }, { status: "affected", version: "4.1(2o)", }, { status: "affected", version: "4.2(1g)", }, { status: "affected", version: "4.1(2g)", }, { status: "affected", version: "4.2(2f)", }, { status: "affected", version: "3.2(6i)", }, { status: "affected", version: "3.2(3i)", }, { status: "affected", version: "3.2(3n)", }, { status: "affected", version: "4.1(2x)", }, { status: "affected", version: "3.2(5d)", }, { status: "affected", version: "4.2(3q)", }, { status: "affected", version: "4.1(1j)", }, { status: "affected", version: "4.1(2w)", }, { status: "affected", version: "3.2(2o)", }, { status: "affected", version: "3.2(3r)", }, { status: "affected", version: "4.0(2c)", }, { status: "affected", version: "4.1(2s)", }, { status: "affected", version: "3.2(7f)", }, { status: "affected", version: "3.2(3o)", }, { status: "affected", version: "3.2(2l)", }, { status: "affected", version: "4.2(1j)", }, { status: "affected", version: "4.2(4i)", }, { status: "affected", version: "3.2(9h)", }, { status: "affected", version: "5.0(1k)", }, { status: "affected", version: "4.2(4k)", }, { status: "affected", version: "5.0(1l)", }, { status: "affected", version: "5.0(2e)", }, { status: "affected", version: "4.2(4o)", }, { status: "affected", version: "4.2(4p)", }, { status: "affected", version: "5.0(2h)", }, { status: "affected", version: "4.2(5k)", }, { status: "affected", version: "4.2(5l)", }, { status: "affected", version: "4.2(5n)", }, { status: "affected", version: "5.1(1h)", }, { status: "affected", version: "4.2(6d)", }, { status: "affected", version: "5.1(2e)", }, { status: "affected", version: "4.2(6g)", }, { status: "affected", version: "4.2(6h)", }, { status: "affected", version: "5.1(3e)", }, { status: "affected", version: "3.2(10e)", }, { status: "affected", version: "4.2(6l)", }, { status: "affected", version: "4.2(7f)", }, { status: "affected", version: "5.1(4c)", }, { status: "affected", version: "4.2(6o)", }, { status: "affected", version: "5.2(1g)", }, { status: "affected", version: "5.2(2e)", }, { status: "affected", version: "4.2(7l)", }, { status: "affected", version: "3.2(10f)", }, { status: "affected", version: "5.2(2f)", }, { status: "affected", version: "5.2(2g)", }, { status: "affected", version: "4.2(7q)", }, { status: "affected", version: "5.2(2h)", }, { status: "affected", version: "5.2(3f)", }, { status: "affected", version: "5.2(3e)", }, { status: "affected", version: "5.2(3g)", }, { status: "affected", version: "4.2(7r)", }, { status: "affected", version: "4.2(7s)", }, { status: "affected", version: "5.2(4d)", }, { status: "affected", version: "5.2(4e)", }, { status: "affected", version: "4.2(7t)", }, { status: "affected", version: "5.2(5d)", }, { status: "affected", version: "3.2(10g)", }, { status: "affected", version: "5.2(5c)", }, { status: "affected", version: "6.0(1g)", }, { status: "affected", version: "4.2(7u)", }, { status: "affected", version: "5.2(5e)", }, { status: "affected", version: "5.2(4f)", }, { status: "affected", version: "5.2(6e)", }, { status: "affected", version: "6.0(1j)", }, { status: "affected", version: "5.2(6g)", }, { status: "affected", version: "5.2(7f)", }, { status: "affected", version: "4.2(7v)", }, { status: "affected", version: "5.2(7g)", }, { status: "affected", version: "6.0(2h)", }, { status: "affected", version: "4.2(7w)", }, { status: "affected", version: "5.2(6h)", }, { status: "affected", version: "5.2(4h)", }, { status: "affected", version: "5.2(8d)", }, { status: "affected", version: "6.0(2j)", }, { status: "affected", version: "5.2(8e)", }, { status: "affected", version: "6.0(3d)", }, { status: "affected", version: "6.0(3e)", }, { status: "affected", version: "5.2(8f)", }, { status: "affected", version: "5.2(8g)", }, { status: "affected", version: "5.3(1d)", }, { status: "affected", version: "5.2(8h)", }, { status: "affected", version: "6.0(4c)", }, { status: "affected", version: "5.3(2a)", }, { status: "affected", version: "5.2(8i)", }, { status: "affected", version: "6.0(5h)", }, { status: "affected", version: "5.3(2b)", }, { status: "affected", version: "6.0(3g)", }, { status: "affected", version: "6.0(5j)", }, { status: "affected", version: "5.3(2c)", }, { status: "affected", version: "6.0(6c)", }, { status: "affected", version: "6.1(1f)", }, { status: "affected", version: "6.0(7e)", }, { status: "affected", version: "5.3(2d)", }, { status: "affected", version: "6.0(8d)", }, { status: "affected", version: "5.3(2e)", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-362", description: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-26T17:13:44.068Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-apic-multi-vulns-9ummtg5", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5", }, ], source: { advisory: "cisco-sa-apic-multi-vulns-9ummtg5", defects: [ "CSCwk18865", ], discovery: "EXTERNAL", }, title: "Cisco Application Policy Infrastructure Controller Authenticated Local Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2025-20119", datePublished: "2025-02-26T16:23:37.170Z", dateReserved: "2024-10-10T19:15:13.211Z", dateUpdated: "2025-03-03T19:02:59.455Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2025-20119\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-02-26T17:15:22.883\",\"lastModified\":\"2025-02-26T18:15:14.570\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.\\r\\n\\r\\nThis vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5\",\"source\":\"psirt@cisco.com\"}]}}", vulnrichment: { containers: "{\"cna\": {\"title\": \"Cisco Application Policy Infrastructure Controller Authenticated Local Denial of Service Vulnerability\", \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H\", \"baseScore\": 6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.\\r\\n\\r\\nThis vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5\", \"name\": \"cisco-sa-apic-multi-vulns-9ummtg5\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory.\"}], \"source\": {\"advisory\": \"cisco-sa-apic-multi-vulns-9ummtg5\", \"discovery\": \"EXTERNAL\", \"defects\": [\"CSCwk18865\"]}, \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')\", \"type\": \"cwe\", \"cweId\": \"CWE-362\"}]}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Application Policy Infrastructure Controller (APIC)\", \"versions\": [{\"version\": \"3.2(8d)\", \"status\": \"affected\"}, {\"version\": \"3.2(1m)\", \"status\": \"affected\"}, {\"version\": \"3.2(5e)\", \"status\": \"affected\"}, {\"version\": \"4.1(2m)\", \"status\": \"affected\"}, {\"version\": \"3.2(41d)\", \"status\": \"affected\"}, {\"version\": \"3.2(3s)\", \"status\": \"affected\"}, {\"version\": \"4.0(3c)\", \"status\": \"affected\"}, {\"version\": \"4.1(1k)\", \"status\": \"affected\"}, {\"version\": \"3.2(4d)\", \"status\": \"affected\"}, {\"version\": \"4.2(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(3j)\", \"status\": \"affected\"}, {\"version\": \"4.2(3n)\", \"status\": \"affected\"}, {\"version\": \"4.0(1h)\", \"status\": \"affected\"}, {\"version\": \"4.1(1l)\", \"status\": \"affected\"}, {\"version\": \"3.2(9f)\", \"status\": \"affected\"}, {\"version\": \"4.2(3l)\", \"status\": \"affected\"}, {\"version\": \"4.2(2g)\", \"status\": \"affected\"}, {\"version\": \"3.2(7k)\", \"status\": \"affected\"}, {\"version\": \"3.2(9b)\", \"status\": \"affected\"}, {\"version\": \"3.2(3j)\", \"status\": \"affected\"}, {\"version\": \"4.1(2u)\", \"status\": \"affected\"}, {\"version\": \"4.2(1l)\", \"status\": \"affected\"}, {\"version\": \"4.1(1a)\", \"status\": \"affected\"}, {\"version\": \"4.0(3d)\", \"status\": \"affected\"}, {\"version\": \"3.2(4e)\", \"status\": \"affected\"}, {\"version\": \"4.1(1i)\", \"status\": \"affected\"}, {\"version\": \"3.2(5f)\", \"status\": \"affected\"}, {\"version\": \"3.2(1l)\", \"status\": \"affected\"}, {\"version\": \"4.2(1i)\", \"status\": \"affected\"}, {\"version\": \"4.1(2o)\", \"status\": \"affected\"}, {\"version\": \"4.2(1g)\", \"status\": \"affected\"}, {\"version\": \"4.1(2g)\", \"status\": \"affected\"}, {\"version\": \"4.2(2f)\", \"status\": \"affected\"}, {\"version\": \"3.2(6i)\", \"status\": \"affected\"}, {\"version\": \"3.2(3i)\", \"status\": \"affected\"}, {\"version\": \"3.2(3n)\", \"status\": \"affected\"}, {\"version\": \"4.1(2x)\", \"status\": \"affected\"}, {\"version\": \"3.2(5d)\", \"status\": \"affected\"}, {\"version\": \"4.2(3q)\", \"status\": \"affected\"}, {\"version\": \"4.1(1j)\", \"status\": \"affected\"}, {\"version\": \"4.1(2w)\", \"status\": \"affected\"}, {\"version\": \"3.2(2o)\", \"status\": \"affected\"}, {\"version\": \"3.2(3r)\", \"status\": \"affected\"}, {\"version\": \"4.0(2c)\", \"status\": \"affected\"}, {\"version\": \"4.1(2s)\", \"status\": \"affected\"}, {\"version\": \"3.2(7f)\", \"status\": \"affected\"}, {\"version\": \"3.2(3o)\", \"status\": \"affected\"}, {\"version\": \"3.2(2l)\", \"status\": \"affected\"}, {\"version\": \"4.2(1j)\", \"status\": \"affected\"}, {\"version\": \"4.2(4i)\", \"status\": \"affected\"}, {\"version\": \"3.2(9h)\", \"status\": \"affected\"}, {\"version\": \"5.0(1k)\", \"status\": \"affected\"}, {\"version\": \"4.2(4k)\", \"status\": \"affected\"}, {\"version\": \"5.0(1l)\", \"status\": \"affected\"}, {\"version\": \"5.0(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(4o)\", \"status\": \"affected\"}, {\"version\": \"4.2(4p)\", \"status\": \"affected\"}, {\"version\": \"5.0(2h)\", \"status\": \"affected\"}, {\"version\": \"4.2(5k)\", \"status\": \"affected\"}, {\"version\": \"4.2(5l)\", \"status\": \"affected\"}, {\"version\": \"4.2(5n)\", \"status\": \"affected\"}, {\"version\": \"5.1(1h)\", \"status\": \"affected\"}, {\"version\": \"4.2(6d)\", \"status\": \"affected\"}, {\"version\": \"5.1(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(6g)\", \"status\": \"affected\"}, {\"version\": \"4.2(6h)\", \"status\": \"affected\"}, {\"version\": \"5.1(3e)\", \"status\": \"affected\"}, {\"version\": \"3.2(10e)\", \"status\": \"affected\"}, {\"version\": \"4.2(6l)\", \"status\": \"affected\"}, {\"version\": \"4.2(7f)\", \"status\": \"affected\"}, {\"version\": \"5.1(4c)\", \"status\": \"affected\"}, {\"version\": \"4.2(6o)\", \"status\": \"affected\"}, {\"version\": \"5.2(1g)\", \"status\": \"affected\"}, {\"version\": \"5.2(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(7l)\", \"status\": \"affected\"}, {\"version\": \"3.2(10f)\", \"status\": \"affected\"}, {\"version\": \"5.2(2f)\", \"status\": \"affected\"}, {\"version\": \"5.2(2g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7q)\", \"status\": \"affected\"}, {\"version\": \"5.2(2h)\", \"status\": \"affected\"}, {\"version\": \"5.2(3f)\", \"status\": \"affected\"}, {\"version\": \"5.2(3e)\", \"status\": \"affected\"}, {\"version\": \"5.2(3g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7r)\", \"status\": \"affected\"}, {\"version\": \"4.2(7s)\", \"status\": \"affected\"}, {\"version\": \"5.2(4d)\", \"status\": \"affected\"}, {\"version\": \"5.2(4e)\", \"status\": \"affected\"}, {\"version\": \"4.2(7t)\", \"status\": \"affected\"}, {\"version\": \"5.2(5d)\", \"status\": \"affected\"}, {\"version\": \"3.2(10g)\", \"status\": \"affected\"}, {\"version\": \"5.2(5c)\", \"status\": \"affected\"}, {\"version\": \"6.0(1g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7u)\", \"status\": \"affected\"}, {\"version\": \"5.2(5e)\", \"status\": \"affected\"}, {\"version\": \"5.2(4f)\", \"status\": \"affected\"}, {\"version\": \"5.2(6e)\", \"status\": \"affected\"}, {\"version\": \"6.0(1j)\", \"status\": \"affected\"}, {\"version\": \"5.2(6g)\", \"status\": \"affected\"}, {\"version\": \"5.2(7f)\", \"status\": \"affected\"}, {\"version\": \"4.2(7v)\", \"status\": \"affected\"}, {\"version\": \"5.2(7g)\", \"status\": \"affected\"}, {\"version\": \"6.0(2h)\", \"status\": \"affected\"}, {\"version\": \"4.2(7w)\", \"status\": \"affected\"}, {\"version\": \"5.2(6h)\", \"status\": \"affected\"}, {\"version\": \"5.2(4h)\", \"status\": \"affected\"}, {\"version\": \"5.2(8d)\", \"status\": \"affected\"}, {\"version\": \"6.0(2j)\", \"status\": \"affected\"}, {\"version\": \"5.2(8e)\", \"status\": \"affected\"}, {\"version\": \"6.0(3d)\", \"status\": \"affected\"}, {\"version\": \"6.0(3e)\", \"status\": \"affected\"}, {\"version\": \"5.2(8f)\", \"status\": \"affected\"}, {\"version\": \"5.2(8g)\", \"status\": \"affected\"}, {\"version\": \"5.3(1d)\", \"status\": \"affected\"}, {\"version\": \"5.2(8h)\", \"status\": \"affected\"}, {\"version\": \"6.0(4c)\", \"status\": \"affected\"}, {\"version\": \"5.3(2a)\", \"status\": \"affected\"}, {\"version\": \"5.2(8i)\", \"status\": \"affected\"}, {\"version\": \"6.0(5h)\", \"status\": \"affected\"}, {\"version\": \"5.3(2b)\", \"status\": \"affected\"}, {\"version\": \"6.0(3g)\", \"status\": \"affected\"}, {\"version\": \"6.0(5j)\", \"status\": \"affected\"}, {\"version\": \"5.3(2c)\", \"status\": \"affected\"}, {\"version\": \"6.0(6c)\", \"status\": \"affected\"}, {\"version\": \"6.1(1f)\", \"status\": \"affected\"}, {\"version\": \"6.0(7e)\", \"status\": \"affected\"}, {\"version\": \"5.3(2d)\", \"status\": \"affected\"}, {\"version\": \"6.0(8d)\", \"status\": \"affected\"}, {\"version\": \"5.3(2e)\", \"status\": \"affected\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-02-26T17:13:44.068Z\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20119\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-26T17:21:01.401418Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-26T18:33:37.394Z\"}}]}", cveMetadata: "{\"cveId\": \"CVE-2025-20119\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"cisco\", \"dateReserved\": \"2024-10-10T19:15:13.211Z\", \"datePublished\": \"2025-02-26T16:23:37.170Z\", \"dateUpdated\": \"2025-03-03T19:02:59.455Z\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.