Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-fj42-7xm3-95v2
Vulnerability from github
A vulnerability in the CLI of Cisco APIC could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.
{ affected: [], aliases: [ "CVE-2025-20117", ], database_specific: { cwe_ids: [ "CWE-77", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2025-02-26T17:15:22Z", severity: "MODERATE", }, details: "A vulnerability in the CLI of Cisco APIC could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\n\nThis vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.", id: "GHSA-fj42-7xm3-95v2", modified: "2025-02-26T18:30:39Z", published: "2025-02-26T18:30:39Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2025-20117", }, { type: "WEB", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", type: "CVSS_V3", }, ], }
cve-2025-20117
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Application Policy Infrastructure Controller (APIC) |
Version: 3.2(8d) Version: 3.2(1m) Version: 3.2(5e) Version: 4.1(2m) Version: 3.2(41d) Version: 3.2(3s) Version: 4.0(3c) Version: 4.1(1k) Version: 3.2(4d) Version: 4.2(2e) Version: 4.2(3j) Version: 4.2(3n) Version: 4.0(1h) Version: 4.1(1l) Version: 3.2(9f) Version: 4.2(3l) Version: 4.2(2g) Version: 3.2(7k) Version: 3.2(9b) Version: 3.2(3j) Version: 4.1(2u) Version: 4.2(1l) Version: 4.1(1a) Version: 4.0(3d) Version: 3.2(4e) Version: 4.1(1i) Version: 3.2(5f) Version: 3.2(1l) Version: 4.2(1i) Version: 4.1(2o) Version: 4.2(1g) Version: 4.1(2g) Version: 4.2(2f) Version: 3.2(6i) Version: 3.2(3i) Version: 3.2(3n) Version: 4.1(2x) Version: 3.2(5d) Version: 4.2(3q) Version: 4.1(1j) Version: 4.1(2w) Version: 3.2(2o) Version: 3.2(3r) Version: 4.0(2c) Version: 4.1(2s) Version: 3.2(7f) Version: 3.2(3o) Version: 3.2(2l) Version: 4.2(1j) Version: 4.2(4i) Version: 3.2(9h) Version: 5.0(1k) Version: 4.2(4k) Version: 5.0(1l) Version: 5.0(2e) Version: 4.2(4o) Version: 4.2(4p) Version: 5.0(2h) Version: 4.2(5k) Version: 4.2(5l) Version: 4.2(5n) Version: 5.1(1h) Version: 4.2(6d) Version: 5.1(2e) Version: 4.2(6g) Version: 4.2(6h) Version: 5.1(3e) Version: 3.2(10e) Version: 4.2(6l) Version: 4.2(7f) Version: 5.1(4c) Version: 4.2(6o) Version: 5.2(1g) Version: 5.2(2e) Version: 4.2(7l) Version: 3.2(10f) Version: 5.2(2f) Version: 5.2(2g) Version: 4.2(7q) Version: 5.2(2h) Version: 5.2(3f) Version: 5.2(3e) Version: 5.2(3g) Version: 4.2(7r) Version: 4.2(7s) Version: 5.2(4d) Version: 5.2(4e) Version: 4.2(7t) Version: 5.2(5d) Version: 3.2(10g) Version: 5.2(5c) Version: 6.0(1g) Version: 4.2(7u) Version: 5.2(5e) Version: 5.2(4f) Version: 5.2(6e) Version: 6.0(1j) Version: 5.2(6g) Version: 5.2(7f) Version: 4.2(7v) Version: 5.2(7g) Version: 6.0(2h) Version: 4.2(7w) Version: 5.2(6h) Version: 5.2(4h) Version: 5.2(8d) Version: 6.0(2j) Version: 5.2(8e) Version: 6.0(3d) Version: 6.0(3e) Version: 5.2(8f) Version: 5.2(8g) Version: 5.3(1d) Version: 5.2(8h) Version: 6.0(4c) Version: 5.3(2a) Version: 5.2(8i) Version: 6.0(5h) Version: 5.3(2b) Version: 6.0(3g) Version: 6.0(5j) Version: 5.3(2c) Version: 6.0(6c) Version: 6.1(1f) Version: 6.0(7e) Version: 5.3(2d) Version: 6.0(8d) Version: 5.3(2e) |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-20117", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-26T16:47:44.354918Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-27T15:16:53.763Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Application Policy Infrastructure Controller (APIC)", vendor: "Cisco", versions: [ { status: "affected", version: "3.2(8d)", }, { status: "affected", version: "3.2(1m)", }, { status: "affected", version: "3.2(5e)", }, { status: "affected", version: "4.1(2m)", }, { status: "affected", version: "3.2(41d)", }, { status: "affected", version: "3.2(3s)", }, { status: "affected", version: "4.0(3c)", }, { status: "affected", version: "4.1(1k)", }, { status: "affected", version: "3.2(4d)", }, { status: "affected", version: "4.2(2e)", }, { status: "affected", version: "4.2(3j)", }, { status: "affected", version: "4.2(3n)", }, { status: "affected", version: "4.0(1h)", }, { status: "affected", version: "4.1(1l)", }, { status: "affected", version: "3.2(9f)", }, { status: "affected", version: "4.2(3l)", }, { status: "affected", version: "4.2(2g)", }, { status: "affected", version: "3.2(7k)", }, { status: "affected", version: "3.2(9b)", }, { status: "affected", version: "3.2(3j)", }, { status: "affected", version: "4.1(2u)", }, { status: "affected", version: "4.2(1l)", }, { status: "affected", version: "4.1(1a)", }, { status: "affected", version: "4.0(3d)", }, { status: "affected", version: "3.2(4e)", }, { status: "affected", version: "4.1(1i)", }, { status: "affected", version: "3.2(5f)", }, { status: "affected", version: "3.2(1l)", }, { status: "affected", version: "4.2(1i)", }, { status: "affected", version: "4.1(2o)", }, { status: "affected", version: "4.2(1g)", }, { status: "affected", version: "4.1(2g)", }, { status: "affected", version: "4.2(2f)", }, { status: "affected", version: "3.2(6i)", }, { status: "affected", version: "3.2(3i)", }, { status: "affected", version: "3.2(3n)", }, { status: "affected", version: "4.1(2x)", }, { status: "affected", version: "3.2(5d)", }, { status: "affected", version: "4.2(3q)", }, { status: "affected", version: "4.1(1j)", }, { status: "affected", version: "4.1(2w)", }, { status: "affected", version: "3.2(2o)", }, { status: "affected", version: "3.2(3r)", }, { status: "affected", version: "4.0(2c)", }, { status: "affected", version: "4.1(2s)", }, { status: "affected", version: "3.2(7f)", }, { status: "affected", version: "3.2(3o)", }, { status: "affected", version: "3.2(2l)", }, { status: "affected", version: "4.2(1j)", }, { status: "affected", version: "4.2(4i)", }, { status: "affected", version: "3.2(9h)", }, { status: "affected", version: "5.0(1k)", }, { status: "affected", version: "4.2(4k)", }, { status: "affected", version: "5.0(1l)", }, { status: "affected", version: "5.0(2e)", }, { status: "affected", version: "4.2(4o)", }, { status: "affected", version: "4.2(4p)", }, { status: "affected", version: "5.0(2h)", }, { status: "affected", version: "4.2(5k)", }, { status: "affected", version: "4.2(5l)", }, { status: "affected", version: "4.2(5n)", }, { status: "affected", version: "5.1(1h)", }, { status: "affected", version: "4.2(6d)", }, { status: "affected", version: "5.1(2e)", }, { status: "affected", version: "4.2(6g)", }, { status: "affected", version: "4.2(6h)", }, { status: "affected", version: "5.1(3e)", }, { status: "affected", version: "3.2(10e)", }, { status: "affected", version: "4.2(6l)", }, { status: "affected", version: "4.2(7f)", }, { status: "affected", version: "5.1(4c)", }, { status: "affected", version: "4.2(6o)", }, { status: "affected", version: "5.2(1g)", }, { status: "affected", version: "5.2(2e)", }, { status: "affected", version: "4.2(7l)", }, { status: "affected", version: "3.2(10f)", }, { status: "affected", version: "5.2(2f)", }, { status: "affected", version: "5.2(2g)", }, { status: "affected", version: "4.2(7q)", }, { status: "affected", version: "5.2(2h)", }, { status: "affected", version: "5.2(3f)", }, { status: "affected", version: "5.2(3e)", }, { status: "affected", version: "5.2(3g)", }, { status: "affected", version: "4.2(7r)", }, { status: "affected", version: "4.2(7s)", }, { status: "affected", version: "5.2(4d)", }, { status: "affected", version: "5.2(4e)", }, { status: "affected", version: "4.2(7t)", }, { status: "affected", version: "5.2(5d)", }, { status: "affected", version: "3.2(10g)", }, { status: "affected", version: "5.2(5c)", }, { status: "affected", version: "6.0(1g)", }, { status: "affected", version: "4.2(7u)", }, { status: "affected", version: "5.2(5e)", }, { status: "affected", version: "5.2(4f)", }, { status: "affected", version: "5.2(6e)", }, { status: "affected", version: "6.0(1j)", }, { status: "affected", version: "5.2(6g)", }, { status: "affected", version: "5.2(7f)", }, { status: "affected", version: "4.2(7v)", }, { status: "affected", version: "5.2(7g)", }, { status: "affected", version: "6.0(2h)", }, { status: "affected", version: "4.2(7w)", }, { status: "affected", version: "5.2(6h)", }, { status: "affected", version: "5.2(4h)", }, { status: "affected", version: "5.2(8d)", }, { status: "affected", version: "6.0(2j)", }, { status: "affected", version: "5.2(8e)", }, { status: "affected", version: "6.0(3d)", }, { status: "affected", version: "6.0(3e)", }, { status: "affected", version: "5.2(8f)", }, { status: "affected", version: "5.2(8g)", }, { status: "affected", version: "5.3(1d)", }, { status: "affected", version: "5.2(8h)", }, { status: "affected", version: "6.0(4c)", }, { status: "affected", version: "5.3(2a)", }, { status: "affected", version: "5.2(8i)", }, { status: "affected", version: "6.0(5h)", }, { status: "affected", version: "5.3(2b)", }, { status: "affected", version: "6.0(3g)", }, { status: "affected", version: "6.0(5j)", }, { status: "affected", version: "5.3(2c)", }, { status: "affected", version: "6.0(6c)", }, { status: "affected", version: "6.1(1f)", }, { status: "affected", version: "6.0(7e)", }, { status: "affected", version: "5.3(2d)", }, { status: "affected", version: "6.0(8d)", }, { status: "affected", version: "5.3(2e)", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco APIC could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-26T16:11:26.187Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-apic-multi-vulns-9ummtg5", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5", }, ], source: { advisory: "cisco-sa-apic-multi-vulns-9ummtg5", defects: [ "CSCwk18862", ], discovery: "EXTERNAL", }, title: "Cisco Application Policy Infrastructure Controller Authenticated Command Injection Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2025-20117", datePublished: "2025-02-26T16:11:26.187Z", dateReserved: "2024-10-10T19:15:13.210Z", dateUpdated: "2025-02-27T15:16:53.763Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.