Логотип exploitDog
bind:CVE-2025-20178
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20178

Количество 3

Количество 3

nvd логотип

CVE-2025-20178

10 месяцев назад

A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root.

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-vr9w-fp6c-vj58

10 месяцев назад

A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root.

CVSS3: 6
EPSS: Низкий
fstec логотип

BDU:2025-05024

10 месяцев назад

Уязвимость веб-интерфейса управления системы анализа сетевого трафика, сетевого обнаружения и реагирования Cisco Secure Network Analytics (ранее Cisco Stealthwatch Enterprise), позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20178

A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root.

CVSS3: 6
0%
Низкий
10 месяцев назад
github логотип
GHSA-vr9w-fp6c-vj58

A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root.

CVSS3: 6
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-05024

Уязвимость веб-интерфейса управления системы анализа сетевого трафика, сетевого обнаружения и реагирования Cisco Secure Network Analytics (ранее Cisco Stealthwatch Enterprise), позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 6
0%
Низкий
10 месяцев назад

Уязвимостей на страницу