Логотип exploitDog
bind:CVE-2025-20160
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20160

Количество 3

Количество 3

nvd логотип

CVE-2025-20160

5 месяцев назад

A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication. This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-g4wr-69xr-36p6

5 месяцев назад

A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication. This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2025-11710

5 месяцев назад

Уязвимость реализации протокола TACACS+ операционных систем Cisco IOS и IOS XE, позволяющая нарушителю обойти существующие ограничения безопасности и раскрыть конфиденциальную информацию

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20160

A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication. This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device.

CVSS3: 8.1
0%
Низкий
5 месяцев назад
github логотип
GHSA-g4wr-69xr-36p6

A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication. This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device.

CVSS3: 8.1
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-11710

Уязвимость реализации протокола TACACS+ операционных систем Cisco IOS и IOS XE, позволяющая нарушителю обойти существующие ограничения безопасности и раскрыть конфиденциальную информацию

CVSS3: 8.1
0%
Низкий
5 месяцев назад

Уязвимостей на страницу