All the vulnerabilites related to Cisco - Cisco Unified Intelligence Center
cve-2025-20113
Vulnerability from cvelistv5
Published
2025-05-21 16:19
Modified
2025-05-22 03:55
Severity ?
EPSS score ?
Summary
Cisco Unified Intelligence Center Privilege Escalation Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20113", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-21T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-22T03:55:17.134Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Unified Contact Center Express", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "10.6(1)" }, { "status": "affected", "version": "10.5(1)SU1" }, { "status": "affected", "version": "10.6(1)SU3" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "10.0(1)SU1" }, { "status": "affected", "version": "10.6(1)SU1" }, { "status": "affected", "version": "11.0(1)SU1" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)_SU03_ES01" }, { "status": "affected", "version": "12.5(1)_SU03_ES02" }, { "status": "affected", "version": "12.5(1)_SU02_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES04" }, { "status": "affected", "version": "12.5(1)_SU02_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES01" }, { "status": "affected", "version": "11.6(2)ES07" }, { "status": "affected", "version": "11.6(2)ES08" }, { "status": "affected", "version": "12.5(1)_SU01_ES01" }, { "status": "affected", "version": "12.0(1)ES04" }, { "status": "affected", "version": "12.5(1)ES02" }, { "status": "affected", "version": "12.5(1)ES03" }, { "status": "affected", "version": "11.6(2)ES06" }, { "status": "affected", "version": "12.5(1)ES01" }, { "status": "affected", "version": "12.0(1)ES03" }, { "status": "affected", "version": "12.0(1)ES01" }, { "status": "affected", "version": "11.6(2)ES05" }, { "status": "affected", "version": "12.0(1)ES02" }, { "status": "affected", "version": "11.6(2)ES04" }, { "status": "affected", "version": "11.6(2)ES03" }, { "status": "affected", "version": "11.6(2)ES02" }, { "status": "affected", "version": "11.6(2)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES03" }, { "status": "affected", "version": "11.0(1)SU1ES03" }, { "status": "affected", "version": "10.6(1)SU3ES01" }, { "status": "affected", "version": "10.5(1)SU1ES10" }, { "status": "affected", "version": "10.0(1)SU1ES04" }, { "status": "affected", "version": "11.5(1)SU1ES03" }, { "status": "affected", "version": "11.6(1)ES02" }, { "status": "affected", "version": "11.5(1)ES01" }, { "status": "affected", "version": "9.0(2)SU3ES04" }, { "status": "affected", "version": "10.6(1)SU2" }, { "status": "affected", "version": "10.6(1)SU2ES04" }, { "status": "affected", "version": "11.6(1)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES02" }, { "status": "affected", "version": "11.5(1)SU1ES02" }, { "status": "affected", "version": "11.5(1)SU1ES01" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "11.0(1)SU1ES02" }, { "status": "affected", "version": "12.5(1)_SU03_ES03" }, { "status": "affected", "version": "12.5(1)_SU03_ES04" }, { "status": "affected", "version": "12.5(1)_SU03_ES05" }, { "status": "affected", "version": "12.5(1)_SU03_ES06" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Intelligence Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "11.0(2)" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.6(1)_ET" }, { "status": "affected", "version": "12.6(1)_ES05_ET" }, { "status": "affected", "version": "11.0(3)" }, { "status": "affected", "version": "12.6(2)" }, { "status": "affected", "version": "12.6(2)_504_Issue_ET" }, { "status": "affected", "version": "12.6.1_ExcelIssue_ET" }, { "status": "affected", "version": "12.6(2)_Permalink_ET" }, { "status": "affected", "version": "12.6.2_CSCwk19536_ET" }, { "status": "affected", "version": "12.6.2_CSCwm96922_ET" }, { "status": "affected", "version": "12.5(2)ET_CSCwi79933" }, { "status": "affected", "version": "12.6.2_CSCwn48501_ET" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to elevate privileges to Administrator for a limited set of functions on an affected system.\r\n\r\nThis vulnerability is due to insufficient server-side validation of user-supplied parameters in API or HTTP requests. An attacker could exploit this vulnerability by submitting a crafted API or HTTP request to an affected system. A successful exploit could allow the attacker to access, modify, or delete data beyond the sphere of their intended access level, including obtaining potentially sensitive information stored in the system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-602", "description": "Client-Side Enforcement of Server-Side Security", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-21T16:19:41.378Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cuis-priv-esc-3Pk96SU4", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-priv-esc-3Pk96SU4" } ], "source": { "advisory": "cisco-sa-cuis-priv-esc-3Pk96SU4", "defects": [ "CSCwk34893" ], "discovery": "EXTERNAL" }, "title": "Cisco Unified Intelligence Center Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20113", "datePublished": "2025-05-21T16:19:41.378Z", "dateReserved": "2024-10-10T19:15:13.210Z", "dateUpdated": "2025-05-22T03:55:17.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20062
Vulnerability from cvelistv5
Published
2023-03-03 00:00
Modified
2024-10-25 16:03
Severity ?
EPSS score ?
Summary
Cisco Unified Intelligence Center Vulnerabilities
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Unified Intelligence Center |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230301 Cisco Unified Intelligence Center Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-infodisc-ssrf-84ZBmwVk" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20062", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:36:29.911725Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T16:03:33.284Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Unified Intelligence Center ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to collect sensitive information or perform a server-side request forgery (SSRF) attack on an affected system. Cisco plans to release software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-03T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230301 Cisco Unified Intelligence Center Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-infodisc-ssrf-84ZBmwVk" } ], "source": { "advisory": "cisco-sa-cuic-infodisc-ssrf-84ZBmwVk", "defect": [ [ "CSCwd01184", "CSCwd02972" ] ], "discovery": "INTERNAL" }, "title": "Cisco Unified Intelligence Center Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20062", "datePublished": "2023-03-03T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T16:03:33.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20058
Vulnerability from cvelistv5
Published
2023-01-19 01:38
Modified
2024-10-25 16:04
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.869Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-cuis-xss-Omm8jyBX", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20058", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:36:44.382026Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T16:04:17.660Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Unified Contact Center Enterprise", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Unified Contact Center Express", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0(1)SU1" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "11.6(2)" } ] }, { "product": "Cisco Unified Intelligence Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.6(1)" } ] }, { "product": "Cisco Packaged Contact Center Enterprise", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(2)" }, { "status": "affected", "version": "12.6(1)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "format": "cvssV3_0" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:39.867Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cuis-xss-Omm8jyBX", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX" } ], "source": { "advisory": "cisco-sa-cuis-xss-Omm8jyBX", "defects": [ "CSCwc84104" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20058", "datePublished": "2023-01-19T01:38:26.055Z", "dateReserved": "2022-10-27T18:47:50.320Z", "dateUpdated": "2024-10-25T16:04:17.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1658
Vulnerability from cvelistv5
Published
2019-01-24 16:00
Modified
2024-11-21 19:47
Severity ?
EPSS score ?
Summary
Cisco Unified Intelligence Center Cross-Site Request Forgery Vulnerability
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106713 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-uic-csrf | vendor-advisory, x_refsource_CISCO |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Unified Intelligence Center |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106713" }, { "name": "20190123 Cisco Unified Intelligence Center Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-uic-csrf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1658", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T19:00:51.980367Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:47:09.847Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Unified Intelligence Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections in the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious, customized link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device via a web browser and with the privileges of the user." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-25T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "106713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106713" }, { "name": "20190123 Cisco Unified Intelligence Center Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-uic-csrf" } ], "source": { "advisory": "cisco-sa-20190123-uic-csrf", "defect": [ [ "CSCvn41579" ] ], "discovery": "INTERNAL" }, "title": "Cisco Unified Intelligence Center Cross-Site Request Forgery Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-01-23T16:00:00-0800", "ID": "CVE-2019-1658", "STATE": "PUBLIC", "TITLE": "Cisco Unified Intelligence Center Cross-Site Request Forgery Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Unified Intelligence Center", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections in the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious, customized link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device via a web browser and with the privileges of the user." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.7", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352" } ] } ] }, "references": { "reference_data": [ { "name": "106713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106713" }, { "name": "20190123 Cisco Unified Intelligence Center Cross-Site Request Forgery Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-uic-csrf" } ] }, "source": { "advisory": "cisco-sa-20190123-uic-csrf", "defect": [ [ "CSCvn41579" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1658", "datePublished": "2019-01-24T16:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:47:09.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20325
Vulnerability from cvelistv5
Published
2024-02-21 16:09
Modified
2024-08-27 21:08
Severity ?
EPSS score ?
Summary
A vulnerability in the Live Data server of Cisco Unified Intelligence Center could allow an unauthenticated, local attacker to read and modify data in a repository that belongs to an internal service on an affected device.
This vulnerability is due to insufficient access control implementations on cluster configuration CLI requests. An attacker could exploit this vulnerability by sending a cluster configuration CLI request to specific directories on an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Unified Intelligence Center |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-cuic-access-control-jJsZQMjj", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-access-control-jJsZQMjj" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:unified_intelligence_center:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:11.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:11.0\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:10.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:11.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:11.6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:12.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:12.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:12.5\\(1\\)su:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_intelligence_center:12.6\\(1\\):*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "unified_intelligence_center", "vendor": "cisco", "versions": [ { "status": "affected", "version": "11.0\\(1\\)" }, { "status": "affected", "version": "11.0\\(2\\)" }, { "status": "affected", "version": "11.0\\(3\\)" }, { "status": "affected", "version": "10.5\\(1\\)" }, { "status": "affected", "version": "11.5\\(1\\)" }, { "status": "affected", "version": "11.6\\(1\\)" }, { "status": "affected", "version": "12.0\\(1\\)" }, { "status": "affected", "version": "12.5\\(1\\)" }, { "status": "affected", "version": "12.5\\(1\\)su" }, { "status": "affected", "version": "12.6\\(1\\)" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20325", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T18:55:16.943266Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-27T21:08:46.957Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Unified Intelligence Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.0(2)" }, { "status": "affected", "version": "11.0(3)" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.6(1)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Live Data server of Cisco Unified Intelligence Center could allow an unauthenticated, local attacker to read and modify data in a repository that belongs to an internal service on an affected device.\r\n\r This vulnerability is due to insufficient access control implementations on cluster configuration CLI requests. An attacker could exploit this vulnerability by sending a cluster configuration CLI request to specific directories on an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-21T16:09:03.422Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cuic-access-control-jJsZQMjj", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-access-control-jJsZQMjj" } ], "source": { "advisory": "cisco-sa-cuic-access-control-jJsZQMjj", "defects": [ "CSCwi22418" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20325", "datePublished": "2024-02-21T16:09:03.422Z", "dateReserved": "2023-11-08T15:08:07.640Z", "dateUpdated": "2024-08-27T21:08:46.957Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20061
Vulnerability from cvelistv5
Published
2023-03-03 00:00
Modified
2024-10-25 16:03
Severity ?
EPSS score ?
Summary
Cisco Unified Intelligence Center Vulnerabilities
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Unified Intelligence Center |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230301 Cisco Unified Intelligence Center Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-infodisc-ssrf-84ZBmwVk" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20061", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:36:31.117470Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T16:03:40.312Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Unified Intelligence Center ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to collect sensitive information or perform a server-side request forgery (SSRF) attack on an affected system. Cisco plans to release software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-03T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230301 Cisco Unified Intelligence Center Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-infodisc-ssrf-84ZBmwVk" } ], "source": { "advisory": "cisco-sa-cuic-infodisc-ssrf-84ZBmwVk", "defect": [ [ "CSCwd01184", "CSCwd02972" ] ], "discovery": "INTERNAL" }, "title": "Cisco Unified Intelligence Center Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20061", "datePublished": "2023-03-03T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T16:03:40.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-20114
Vulnerability from cvelistv5
Published
2025-05-21 16:19
Modified
2025-05-22 03:55
Severity ?
EPSS score ?
Summary
Cisco Unified Intelligence Center Insecure Direct Object Reference Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20114", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-21T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-22T03:55:18.609Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Unified Contact Center Express", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "10.6(1)" }, { "status": "affected", "version": "10.5(1)SU1" }, { "status": "affected", "version": "10.6(1)SU3" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "10.0(1)SU1" }, { "status": "affected", "version": "10.6(1)SU1" }, { "status": "affected", "version": "11.0(1)SU1" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)_SU03_ES01" }, { "status": "affected", "version": "12.5(1)_SU03_ES02" }, { "status": "affected", "version": "12.5(1)_SU02_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES04" }, { "status": "affected", "version": "12.5(1)_SU02_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES01" }, { "status": "affected", "version": "11.6(2)ES07" }, { "status": "affected", "version": "11.6(2)ES08" }, { "status": "affected", "version": "12.5(1)_SU01_ES01" }, { "status": "affected", "version": "12.0(1)ES04" }, { "status": "affected", "version": "12.5(1)ES02" }, { "status": "affected", "version": "12.5(1)ES03" }, { "status": "affected", "version": "11.6(2)ES06" }, { "status": "affected", "version": "12.5(1)ES01" }, { "status": "affected", "version": "12.0(1)ES03" }, { "status": "affected", "version": "12.0(1)ES01" }, { "status": "affected", "version": "11.6(2)ES05" }, { "status": "affected", "version": "12.0(1)ES02" }, { "status": "affected", "version": "11.6(2)ES04" }, { "status": "affected", "version": "11.6(2)ES03" }, { "status": "affected", "version": "11.6(2)ES02" }, { "status": "affected", "version": "11.6(2)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES03" }, { "status": "affected", "version": "11.0(1)SU1ES03" }, { "status": "affected", "version": "10.6(1)SU3ES01" }, { "status": "affected", "version": "10.5(1)SU1ES10" }, { "status": "affected", "version": "10.0(1)SU1ES04" }, { "status": "affected", "version": "11.5(1)SU1ES03" }, { "status": "affected", "version": "11.6(1)ES02" }, { "status": "affected", "version": "11.5(1)ES01" }, { "status": "affected", "version": "9.0(2)SU3ES04" }, { "status": "affected", "version": "10.6(1)SU2" }, { "status": "affected", "version": "10.6(1)SU2ES04" }, { "status": "affected", "version": "11.6(1)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES02" }, { "status": "affected", "version": "11.5(1)SU1ES02" }, { "status": "affected", "version": "11.5(1)SU1ES01" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "11.0(1)SU1ES02" }, { "status": "affected", "version": "12.5(1)_SU03_ES03" }, { "status": "affected", "version": "12.5(1)_SU03_ES04" }, { "status": "affected", "version": "12.5(1)_SU03_ES05" }, { "status": "affected", "version": "12.5(1)_SU03_ES06" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Intelligence Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "11.0(2)" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.6(1)_ET" }, { "status": "affected", "version": "12.6(1)_ES05_ET" }, { "status": "affected", "version": "11.0(3)" }, { "status": "affected", "version": "12.6(2)" }, { "status": "affected", "version": "12.6(2)_504_Issue_ET" }, { "status": "affected", "version": "12.6.1_ExcelIssue_ET" }, { "status": "affected", "version": "12.6(2)_Permalink_ET" }, { "status": "affected", "version": "12.6.2_CSCwk19536_ET" }, { "status": "affected", "version": "12.6.2_CSCwm96922_ET" }, { "status": "affected", "version": "12.6.2_Amq_OOS_ET" }, { "status": "affected", "version": "12.5(2)ET_CSCwi79933" }, { "status": "affected", "version": "12.6(2)_ET" }, { "status": "affected", "version": "12.6.2_CSCwn48501_ET" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the API of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform a horizontal privilege escalation attack on an affected system.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by submitting crafted API requests to an affected system to execute an insecure direct object reference attack. A successful exploit could allow the attacker to access specific data that is associated with different users on the affected system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-21T16:19:33.618Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cuis-priv-esc-3Pk96SU4", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-priv-esc-3Pk96SU4" } ], "source": { "advisory": "cisco-sa-cuis-priv-esc-3Pk96SU4", "defects": [ "CSCwk34894" ], "discovery": "EXTERNAL" }, "title": "Cisco Unified Intelligence Center Insecure Direct Object Reference Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20114", "datePublished": "2025-05-21T16:19:33.618Z", "dateReserved": "2024-10-10T19:15:13.210Z", "dateUpdated": "2025-05-22T03:55:18.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1860
Vulnerability from cvelistv5
Published
2019-05-16 01:20
Modified
2024-11-21 19:24
Severity ?
EPSS score ?
Summary
Cisco Unified Intelligence Center Remote File Injection Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cuic-cmdinj | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108354 | vdb-entry, x_refsource_BID |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Unified Intelligence Center |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190515 Cisco Unified Intelligence Center Remote File Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cuic-cmdinj" }, { "name": "108354", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108354" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1860", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:58:24.752342Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:24:32.924Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Unified Intelligence Center", "vendor": "Cisco", "versions": [ { "lessThan": "n/a", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the dashboard gadget rendering of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to obtain or manipulate sensitive information between a user\u0026rsquo;s browser and Cisco Unified Intelligence Center. The vulnerability is due to the lack of gadget validation. An attacker could exploit this vulnerability by forcing a user to load a malicious gadget. A successful exploit could allow the attacker to obtain sensitive information, such as current user credentials, or manipulate data between the user\u0026rsquo;s browser and Cisco Unified Intelligence Center in the context of the malicious gadget." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-99", "description": "CWE-99", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-17T05:06:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190515 Cisco Unified Intelligence Center Remote File Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cuic-cmdinj" }, { "name": "108354", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108354" } ], "source": { "advisory": "cisco-sa-20190515-cuic-cmdinj", "defect": [ [ "CSCvo98208" ] ], "discovery": "INTERNAL" }, "title": "Cisco Unified Intelligence Center Remote File Injection Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-15T16:00:00-0700", "ID": "CVE-2019-1860", "STATE": "PUBLIC", "TITLE": "Cisco Unified Intelligence Center Remote File Injection Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Unified Intelligence Center", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the dashboard gadget rendering of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to obtain or manipulate sensitive information between a user\u0026rsquo;s browser and Cisco Unified Intelligence Center. The vulnerability is due to the lack of gadget validation. An attacker could exploit this vulnerability by forcing a user to load a malicious gadget. A successful exploit could allow the attacker to obtain sensitive information, such as current user credentials, or manipulate data between the user\u0026rsquo;s browser and Cisco Unified Intelligence Center in the context of the malicious gadget." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.9", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-99" } ] } ] }, "references": { "reference_data": [ { "name": "20190515 Cisco Unified Intelligence Center Remote File Injection Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cuic-cmdinj" }, { "name": "108354", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108354" } ] }, "source": { "advisory": "cisco-sa-20190515-cuic-cmdinj", "defect": [ [ "CSCvo98208" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1860", "datePublished": "2019-05-16T01:20:14.607283Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:24:32.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-20112
Vulnerability from cvelistv5
Published
2025-05-21 16:19
Modified
2025-05-22 03:55
Severity ?
EPSS score ?
Summary
Cisco Unified Communications Products Privilege Escalation Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20112", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-21T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-22T03:55:22.658Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Emergency Responder", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1a)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU4" }, { "status": "affected", "version": "14" }, { "status": "affected", "version": "12.5(1)SU5" }, { "status": "affected", "version": "14SU1" }, { "status": "affected", "version": "12.5(1)SU6" }, { "status": "affected", "version": "14SU2" }, { "status": "affected", "version": "12.5(1)SU7" }, { "status": "affected", "version": "14SU3" }, { "status": "affected", "version": "12.5(1)SU8" }, { "status": "affected", "version": "12.5(1)SU8a" }, { "status": "affected", "version": "12.5(1)SU8b" }, { "status": "affected", "version": "14SU3a" }, { "status": "affected", "version": "15" }, { "status": "affected", "version": "15SU1" }, { "status": "affected", "version": "15SU1a" }, { "status": "affected", "version": "14SU4" }, { "status": "affected", "version": "12.5(1)SU9" } ] }, { "defaultStatus": "unknown", "product": "Cisco Finesse", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0(1)ES_Rollback" }, { "status": "affected", "version": "10.5(1)ES4" }, { "status": "affected", "version": "11.6(1)ES3" }, { "status": "affected", "version": "11.0(1)ES2" }, { "status": "affected", "version": "12.0(1)ES2" }, { "status": "affected", "version": "10.5(1)ES3" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.6(1)FIPS" }, { "status": "affected", "version": "11.6(1)ES4" }, { "status": "affected", "version": "11.0(1)ES3" }, { "status": "affected", "version": "10.5(1)ES6" }, { "status": "affected", "version": "11.0(1)ES7" }, { "status": "affected", "version": "11.5(1)ES4" }, { "status": "affected", "version": "10.5(1)ES8" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.5(1)ES10" }, { "status": "affected", "version": "11.6(1)ES2" }, { "status": "affected", "version": "11.6(1)ES" }, { "status": "affected", "version": "11.0(1)ES6" }, { "status": "affected", "version": "11.0(1)ES4" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "11.6(1)ES7" }, { "status": "affected", "version": "10.5(1)ES7" }, { "status": "affected", "version": "11.6(1)ES8" }, { "status": "affected", "version": "11.5(1)ES1" }, { "status": "affected", "version": "11.6(1)ES1" }, { "status": "affected", "version": "11.5(1)ES5" }, { "status": "affected", "version": "11.0(1)ES1" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)ES6" }, { "status": "affected", "version": "10.5(1)ES2" }, { "status": "affected", "version": "12.0(1)ES1" }, { "status": "affected", "version": "11.0(1)ES5" }, { "status": "affected", "version": "10.5(1)ES5" }, { "status": "affected", "version": "11.5(1)ES3" }, { "status": "affected", "version": "11.5(1)ES2" }, { "status": "affected", "version": "10.5(1)ES9" }, { "status": "affected", "version": "11.6(1)ES5" }, { "status": "affected", "version": "11.6(1)ES9" }, { "status": "affected", "version": "11.5(1)ES6" }, { "status": "affected", "version": "10.5(1)ES1" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.0(1)ES3" }, { "status": "affected", "version": "11.6(1)ES10" }, { "status": "affected", "version": "12.5(1)ES1" }, { "status": "affected", "version": "12.5(1)ES2" }, { "status": "affected", "version": "12.0(1)ES4" }, { "status": "affected", "version": "12.5(1)ES3" }, { "status": "affected", "version": "12.0(1)ES5" }, { "status": "affected", "version": "12.5(1)ES4" }, { "status": "affected", "version": "12.0(1)ES6" }, { "status": "affected", "version": "12.5(1)ES5" }, { "status": "affected", "version": "12.5(1)ES6" }, { "status": "affected", "version": "12.0(1)ES7" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.5(1)ES7" }, { "status": "affected", "version": "11.6(1)ES11" }, { "status": "affected", "version": "12.6(1)ES1" }, { "status": "affected", "version": "12.0(1)ES8" }, { "status": "affected", "version": "12.5(1)ES8" }, { "status": "affected", "version": "12.6(1)ES2" }, { "status": "affected", "version": "12.6(1)ES3" }, { "status": "affected", "version": "12.6(1)ES4" }, { "status": "affected", "version": "12.6(1)ES5" }, { "status": "affected", "version": "12.5(2)" }, { "status": "affected", "version": "12.5(1)_SU" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.6(1)ES6" }, { "status": "affected", "version": "12.5(1)SU ES1" }, { "status": "affected", "version": "12.6(1)ES7" }, { "status": "affected", "version": "12.6(1)ES7_ET" }, { "status": "affected", "version": "12.6(2)" }, { "status": "affected", "version": "12.6(1)ES8" }, { "status": "affected", "version": "12.6(1)ES9" }, { "status": "affected", "version": "12.6(2)ES1" }, { "status": "affected", "version": "12.6(1)ES10" }, { "status": "affected", "version": "12.5(1)SU ES2" }, { "status": "affected", "version": "12.6(1)ES11" }, { "status": "affected", "version": "12.6(2)ES2" }, { "status": "affected", "version": "12.6(2)ES3" }, { "status": "affected", "version": "12.5(1)SU ES3" }, { "status": "affected", "version": "12.6(2)ES4" }, { "status": "affected", "version": "12.6(2)ES6" } ] }, { "defaultStatus": "unknown", "product": "Cisco Prime Collaboration Deployment", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.0(1a)" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "10.5(3)" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.0(1a)" }, { "status": "affected", "version": "11.5(3)" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "11.5(2)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.5(2)" }, { "status": "affected", "version": "10.5(3)SU1" }, { "status": "affected", "version": "14" }, { "status": "affected", "version": "14SU1" }, { "status": "affected", "version": "14SU2" }, { "status": "affected", "version": "14SU3" }, { "status": "affected", "version": "15" }, { "status": "affected", "version": "15SU1" }, { "status": "affected", "version": "14SU4" } ] }, { "defaultStatus": "unknown", "product": "Cisco SocialMiner", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)ES01" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.6(1)" }, { "status": "affected", "version": "12.0(1)ES04" }, { "status": "affected", "version": "10.6(2)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.0(1)ES02" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "12.0(1)ES03" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Communications Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU4" }, { "status": "affected", "version": "14" }, { "status": "affected", "version": "12.5(1)SU5" }, { "status": "affected", "version": "14SU1" }, { "status": "affected", "version": "12.5(1)SU6" }, { "status": "affected", "version": "14SU2" }, { "status": "affected", "version": "12.5(1)SU7" }, { "status": "affected", "version": "12.5(1)SU7a" }, { "status": "affected", "version": "14SU3" }, { "status": "affected", "version": "12.5(1)SU8" }, { "status": "affected", "version": "12.5(1)SU8a" }, { "status": "affected", "version": "15" }, { "status": "affected", "version": "15SU1" }, { "status": "affected", "version": "14SU4" }, { "status": "affected", "version": "14SU4a" }, { "status": "affected", "version": "15SU1a" }, { "status": "affected", "version": "12.5(1)SU9" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Communications Manager IM and Presence Service", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU4" }, { "status": "affected", "version": "14" }, { "status": "affected", "version": "12.5(1)SU5" }, { "status": "affected", "version": "14SU1" }, { "status": "affected", "version": "12.5(1)SU6" }, { "status": "affected", "version": "14SU2" }, { "status": "affected", "version": "14SU2a" }, { "status": "affected", "version": "12.5(1)SU7" }, { "status": "affected", "version": "14SU3" }, { "status": "affected", "version": "12.5(1)SU8" }, { "status": "affected", "version": "15" }, { "status": "affected", "version": "15SU1" }, { "status": "affected", "version": "14SU4" }, { "status": "affected", "version": "12.5(1)SU9" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Contact Center Express", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "10.5(1)SU1" }, { "status": "affected", "version": "10.6(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.6(1)SU1" }, { "status": "affected", "version": "10.6(1)SU3" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "10.0(1)SU1" }, { "status": "affected", "version": "11.0(1)SU1" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)_SU03_ES01" }, { "status": "affected", "version": "12.5(1)_SU03_ES02" }, { "status": "affected", "version": "12.5(1)_SU02_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES04" }, { "status": "affected", "version": "12.5(1)_SU02_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES01" }, { "status": "affected", "version": "11.6(2)ES07" }, { "status": "affected", "version": "11.6(2)ES08" }, { "status": "affected", "version": "12.5(1)_SU01_ES01" }, { "status": "affected", "version": "12.0(1)ES04" }, { "status": "affected", "version": "12.5(1)ES02" }, { "status": "affected", "version": "12.5(1)ES03" }, { "status": "affected", "version": "11.6(2)ES06" }, { "status": "affected", "version": "12.5(1)ES01" }, { "status": "affected", "version": "12.0(1)ES03" }, { "status": "affected", "version": "12.0(1)ES01" }, { "status": "affected", "version": "11.6(2)ES05" }, { "status": "affected", "version": "12.0(1)ES02" }, { "status": "affected", "version": "11.6(2)ES04" }, { "status": "affected", "version": "11.6(2)ES03" }, { "status": "affected", "version": "11.6(2)ES02" }, { "status": "affected", "version": "11.6(2)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES03" }, { "status": "affected", "version": "11.0(1)SU1ES03" }, { "status": "affected", "version": "10.6(1)SU3ES01" }, { "status": "affected", "version": "10.5(1)SU1ES10" }, { "status": "affected", "version": "10.0(1)SU1ES04" }, { "status": "affected", "version": "11.5(1)SU1ES03" }, { "status": "affected", "version": "11.6(1)ES02" }, { "status": "affected", "version": "11.5(1)ES01" }, { "status": "affected", "version": "9.0(2)SU3ES04" }, { "status": "affected", "version": "10.6(1)SU2" }, { "status": "affected", "version": "10.6(1)SU2ES04" }, { "status": "affected", "version": "11.6(1)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES02" }, { "status": "affected", "version": "11.5(1)SU1ES02" }, { "status": "affected", "version": "11.5(1)SU1ES01" }, { "status": "affected", "version": "8.5(1)SU4ES09" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "11.0(1)SU1ES02" }, { "status": "affected", "version": "12.5(1)_SU03_ES03" }, { "status": "affected", "version": "12.5(1)_SU03_ES04" }, { "status": "affected", "version": "12.5(1)_SU03_ES05" }, { "status": "affected", "version": "12.5(1)_SU03_ES06" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Intelligence Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "11.0(2)" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.6(1)_ET" }, { "status": "affected", "version": "12.6(1)_ES05_ET" }, { "status": "affected", "version": "11.0(3)" }, { "status": "affected", "version": "12.6(2)" }, { "status": "affected", "version": "12.6(2)_504_Issue_ET" }, { "status": "affected", "version": "12.6.1_ExcelIssue_ET" }, { "status": "affected", "version": "12.6(2)_Permalink_ET" }, { "status": "affected", "version": "12.6.2_CSCwk19536_ET" }, { "status": "affected", "version": "12.6.2_CSCwm96922_ET" }, { "status": "affected", "version": "12.6.2_Amq_OOS_ET" }, { "status": "affected", "version": "12.5(2)ET_CSCwi79933" }, { "status": "affected", "version": "12.6(2)_ET" }, { "status": "affected", "version": "12.6.2_CSCwn48501_ET" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unity Connection", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU4" }, { "status": "affected", "version": "14" }, { "status": "affected", "version": "12.5(1)SU5" }, { "status": "affected", "version": "14SU1" }, { "status": "affected", "version": "12.5(1)SU6" }, { "status": "affected", "version": "14SU2" }, { "status": "affected", "version": "12.5(1)SU7" }, { "status": "affected", "version": "14SU3" }, { "status": "affected", "version": "12.5(1)SU8" }, { "status": "affected", "version": "14SU3a" }, { "status": "affected", "version": "12.5(1)SU8a" }, { "status": "affected", "version": "15" }, { "status": "affected", "version": "15SU1" }, { "status": "affected", "version": "14SU4" }, { "status": "affected", "version": "12.5(1)SU9" } ] }, { "defaultStatus": "unknown", "product": "Cisco Virtualized Voice Browser", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.6(1)_ES84" }, { "status": "affected", "version": "11.5(1)_ES54" }, { "status": "affected", "version": "11.5(1)_ES27" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.5(1)ES36" }, { "status": "affected", "version": "12.0(1)_ES01" }, { "status": "affected", "version": "11.6(1)_ES85" }, { "status": "affected", "version": "12.5(1)_ES05" }, { "status": "affected", "version": "11.5(1)_ES32" }, { "status": "affected", "version": "11.6(1)_ES83" }, { "status": "affected", "version": "11.5(1)_ES29" }, { "status": "affected", "version": "12.0(1)_ES06" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.0(1)_ES07" }, { "status": "affected", "version": "11.6(1)_ES80" }, { "status": "affected", "version": "12.0(1)_ES05" }, { "status": "affected", "version": "11.5(1)_ES36" }, { "status": "affected", "version": "11.5(1)_ES53" }, { "status": "affected", "version": "12.5(1)_ES08" }, { "status": "affected", "version": "11.5(1)ES43" }, { "status": "affected", "version": "12.0(1)_ES03" }, { "status": "affected", "version": "11.6(1)_ES86" }, { "status": "affected", "version": "12.0(1)_ES04" }, { "status": "affected", "version": "11.5(1)ES27" }, { "status": "affected", "version": "12.5(1)_ES03" }, { "status": "affected", "version": "11.6(1)_ES88" }, { "status": "affected", "version": "12.5(1)_ES06" }, { "status": "affected", "version": "11.6(1)_ES82" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "11.5(1)ES29" }, { "status": "affected", "version": "12.5(1)_ES04" }, { "status": "affected", "version": "12.5(1)_ES07" }, { "status": "affected", "version": "11.6(1)_ES87" }, { "status": "affected", "version": "11.6(1)_ES81" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "11.6(1)_ES22" }, { "status": "affected", "version": "11.5(1)_ES43" }, { "status": "affected", "version": "11.5(1)ES32" }, { "status": "affected", "version": "12.0(1)_ES02" }, { "status": "affected", "version": "12.5(1)_ES02" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.5(1)_ES09" }, { "status": "affected", "version": "12.6(1)_ES01" }, { "status": "affected", "version": "12.0(1)_ES08" }, { "status": "affected", "version": "12.5(1)_ES10" }, { "status": "affected", "version": "12.6(1)_ES02" }, { "status": "affected", "version": "12.5(1)_ES11" }, { "status": "affected", "version": "12.5(1)_ES12" }, { "status": "affected", "version": "12.6(1)_ES03" }, { "status": "affected", "version": "12.5(1)_ES13" }, { "status": "affected", "version": "12.5(1)_ES14" }, { "status": "affected", "version": "12.6(1)_ES04" }, { "status": "affected", "version": "12.6(1)_ES05" }, { "status": "affected", "version": "12.5(1)_ES15" }, { "status": "affected", "version": "12.6(1)_ES06" }, { "status": "affected", "version": "12.6(1)_ET" }, { "status": "affected", "version": "12.5(1)_ES16" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.5(1)_SU" }, { "status": "affected", "version": "12.5(1)_SU_ES01" }, { "status": "affected", "version": "12.6(1)_ES07" }, { "status": "affected", "version": "12.6(2)" }, { "status": "affected", "version": "12.5(1)_ES17" }, { "status": "affected", "version": "12.6(1)_ES08" }, { "status": "affected", "version": "12.6(1)_ES09" }, { "status": "affected", "version": "12.6(1)_ES10" }, { "status": "affected", "version": "12.5(1)_SU_ES02" }, { "status": "affected", "version": "12.6(2)_ES01" }, { "status": "affected", "version": "12.6(2)_ET01" }, { "status": "affected", "version": "12.5(2)_ET" }, { "status": "affected", "version": "12.6(2)_ES02" }, { "status": "affected", "version": "12.6(2)_ET_Streaming" }, { "status": "affected", "version": "12.6(2)ET_Transcribe" }, { "status": "affected", "version": "12.6(2)_ES03" }, { "status": "affected", "version": "12.6(2)ET_NuanceMix" }, { "status": "affected", "version": "12.6(2)ET_FileUpload" }, { "status": "affected", "version": "12.6(2)_ET02" }, { "status": "affected", "version": "12.6(2)_ES04" }, { "status": "affected", "version": "12.6.2ET_RTPfallback" }, { "status": "affected", "version": "12.6.2ET_CSCwf55306" }, { "status": "affected", "version": "12.6.2_ET_CSCwj36712" }, { "status": "affected", "version": "12.5.2 ET-CSCwj33374" }, { "status": "affected", "version": "12.5(1) SU ET" }, { "status": "affected", "version": "12.6(2)ET_CSCwj87296" }, { "status": "affected", "version": "12.6(2)_ES05" }, { "status": "affected", "version": "12.5.2_ET_CSCvz27014" }, { "status": "affected", "version": "12.6(2)_ET" }, { "status": "affected", "version": "12.6.2-ET" }, { "status": "affected", "version": "12.6(2)ET_CSCwk83135" }, { "status": "affected", "version": "12.6.2_ET_CX_ALAW" }, { "status": "affected", "version": "12.6.2-ET01-SSL" }, { "status": "affected", "version": "12.6(2)_ES06" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r\nThis vulnerability is due to excessive permissions that have been assigned to system commands.\u0026nbsp;An attacker could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of an affected device. To successfully exploit this vulnerability, an attacker would need administrative access to the ESXi hypervisor." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-268", "description": "Privilege Chaining", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-21T16:19:24.562Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cucm-kkhZbHR5", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-kkhZbHR5" } ], "source": { "advisory": "cisco-sa-cucm-kkhZbHR5", "defects": [ "CSCwi52980" ], "discovery": "EXTERNAL" }, "title": "Cisco Unified Communications Products Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20112", "datePublished": "2025-05-21T16:19:24.562Z", "dateReserved": "2024-10-10T19:15:13.210Z", "dateUpdated": "2025-05-22T03:55:22.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-20278
Vulnerability from cvelistv5
Published
2025-06-04 16:18
Modified
2025-06-06 03:55
Severity ?
EPSS score ?
Summary
Cisco Unified Communications Products Command Injection Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-05T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-06T03:55:32.661Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Finesse", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0(1)ES_Rollback" }, { "status": "affected", "version": "10.5(1)ES4" }, { "status": "affected", "version": "11.6(1)ES3" }, { "status": "affected", "version": "11.0(1)ES2" }, { "status": "affected", "version": "12.0(1)ES2" }, { "status": "affected", "version": "10.5(1)ES3" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.6(1)FIPS" }, { "status": "affected", "version": "11.6(1)ES4" }, { "status": "affected", "version": "11.0(1)ES3" }, { "status": "affected", "version": "10.5(1)ES6" }, { "status": "affected", "version": "11.0(1)ES7" }, { "status": "affected", "version": "11.5(1)ES4" }, { "status": "affected", "version": "10.5(1)ES8" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.5(1)ES10" }, { "status": "affected", "version": "11.6(1)ES2" }, { "status": "affected", "version": "11.6(1)ES" }, { "status": "affected", "version": "11.0(1)ES6" }, { "status": "affected", "version": "11.0(1)ES4" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "11.6(1)ES7" }, { "status": "affected", "version": "10.5(1)ES7" }, { "status": "affected", "version": "11.6(1)ES8" }, { "status": "affected", "version": "11.5(1)ES1" }, { "status": "affected", "version": "11.6(1)ES1" }, { "status": "affected", "version": "11.5(1)ES5" }, { "status": "affected", "version": "11.0(1)ES1" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)ES6" }, { "status": "affected", "version": "10.5(1)ES2" }, { "status": "affected", "version": "12.0(1)ES1" }, { "status": "affected", "version": "11.0(1)ES5" }, { "status": "affected", "version": "10.5(1)ES5" }, { "status": "affected", "version": "11.5(1)ES3" }, { "status": "affected", "version": "11.5(1)ES2" }, { "status": "affected", "version": "10.5(1)ES9" }, { "status": "affected", "version": "11.6(1)ES5" }, { "status": "affected", "version": "11.6(1)ES9" }, { "status": "affected", "version": "11.5(1)ES6" }, { "status": "affected", "version": "10.5(1)ES1" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.0(1)ES3" }, { "status": "affected", "version": "11.6(1)ES10" }, { "status": "affected", "version": "12.5(1)ES1" }, { "status": "affected", "version": "12.5(1)ES2" }, { "status": "affected", "version": "12.0(1)ES4" }, { "status": "affected", "version": "12.5(1)ES3" }, { "status": "affected", "version": "12.0(1)ES5" }, { "status": "affected", "version": "12.5(1)ES4" }, { "status": "affected", "version": "12.0(1)ES6" }, { "status": "affected", "version": "12.5(1)ES5" }, { "status": "affected", "version": "12.5(1)ES6" }, { "status": "affected", "version": "12.0(1)ES7" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.5(1)ES7" }, { "status": "affected", "version": "11.6(1)ES11" }, { "status": "affected", "version": "12.6(1)ES1" }, { "status": "affected", "version": "12.0(1)ES8" }, { "status": "affected", "version": "12.5(1)ES8" }, { "status": "affected", "version": "12.6(1)ES2" }, { "status": "affected", "version": "12.6(1)ES3" }, { "status": "affected", "version": "12.6(1)ES4" }, { "status": "affected", "version": "12.6(1)ES5" }, { "status": "affected", "version": "12.5(2)" }, { "status": "affected", "version": "12.5(1)_SU" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.6(1)ES6" }, { "status": "affected", "version": "12.5(1)SU ES1" }, { "status": "affected", "version": "12.6(1)ES7" }, { "status": "affected", "version": "12.6(1)ES7_ET" }, { "status": "affected", "version": "12.6(2)" }, { "status": "affected", "version": "12.6(1)ES8" }, { "status": "affected", "version": "12.6(1)ES9" }, { "status": "affected", "version": "12.6(2)ES1" }, { "status": "affected", "version": "12.6(1)ES10" }, { "status": "affected", "version": "12.5(1)SU ES2" }, { "status": "affected", "version": "12.6(1)ES11" }, { "status": "affected", "version": "12.6(2)ES2" }, { "status": "affected", "version": "12.6(2)ES3" }, { "status": "affected", "version": "12.5(1)SU ES3" }, { "status": "affected", "version": "12.6(2)ES4" }, { "status": "affected", "version": "12.6(2)ES5" } ] }, { "defaultStatus": "unknown", "product": "Cisco SocialMiner", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)ES01" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.6(1)" }, { "status": "affected", "version": "12.0(1)ES04" }, { "status": "affected", "version": "10.6(2)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.0(1)ES02" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "12.0(1)ES03" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Communications Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU4" }, { "status": "affected", "version": "14" }, { "status": "affected", "version": "12.5(1)SU5" }, { "status": "affected", "version": "14SU1" }, { "status": "affected", "version": "12.5(1)SU6" }, { "status": "affected", "version": "14SU2" }, { "status": "affected", "version": "12.5(1)SU7" }, { "status": "affected", "version": "12.5(1)SU7a" }, { "status": "affected", "version": "14SU3" }, { "status": "affected", "version": "12.5(1)SU8" }, { "status": "affected", "version": "12.5(1)SU8a" }, { "status": "affected", "version": "15" }, { "status": "affected", "version": "15SU1" }, { "status": "affected", "version": "14SU4" }, { "status": "affected", "version": "14SU4a" }, { "status": "affected", "version": "15SU1a" }, { "status": "affected", "version": "12.5(1)SU9" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Communications Manager IM and Presence Service", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU4" }, { "status": "affected", "version": "14" }, { "status": "affected", "version": "12.5(1)SU5" }, { "status": "affected", "version": "14SU1" }, { "status": "affected", "version": "12.5(1)SU6" }, { "status": "affected", "version": "14SU2" }, { "status": "affected", "version": "14SU2a" }, { "status": "affected", "version": "12.5(1)SU7" }, { "status": "affected", "version": "14SU3" }, { "status": "affected", "version": "12.5(1)SU8" }, { "status": "affected", "version": "15" }, { "status": "affected", "version": "Recovery ISO" }, { "status": "affected", "version": "15SU1" }, { "status": "affected", "version": "14SU4" }, { "status": "affected", "version": "12.5(1)SU9" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Contact Center Express", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "10.6(1)" }, { "status": "affected", "version": "10.5(1)SU1" }, { "status": "affected", "version": "10.6(1)SU3" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "10.0(1)SU1" }, { "status": "affected", "version": "10.6(1)SU1" }, { "status": "affected", "version": "11.0(1)SU1" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)_SU03_ES01" }, { "status": "affected", "version": "12.5(1)_SU03_ES02" }, { "status": "affected", "version": "12.5(1)_SU02_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES04" }, { "status": "affected", "version": "12.5(1)_SU02_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES01" }, { "status": "affected", "version": "11.6(2)ES07" }, { "status": "affected", "version": "11.6(2)ES08" }, { "status": "affected", "version": "12.5(1)_SU01_ES01" }, { "status": "affected", "version": "12.0(1)ES04" }, { "status": "affected", "version": "12.5(1)ES02" }, { "status": "affected", "version": "12.5(1)ES03" }, { "status": "affected", "version": "11.6(2)ES06" }, { "status": "affected", "version": "12.5(1)ES01" }, { "status": "affected", "version": "12.0(1)ES03" }, { "status": "affected", "version": "12.0(1)ES01" }, { "status": "affected", "version": "11.6(2)ES05" }, { "status": "affected", "version": "12.0(1)ES02" }, { "status": "affected", "version": "11.6(2)ES04" }, { "status": "affected", "version": "11.6(2)ES03" }, { "status": "affected", "version": "11.6(2)ES02" }, { "status": "affected", "version": "11.6(2)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES03" }, { "status": "affected", "version": "11.0(1)SU1ES03" }, { "status": "affected", "version": "10.6(1)SU3ES01" }, { "status": "affected", "version": "10.5(1)SU1ES10" }, { "status": "affected", "version": "10.0(1)SU1ES04" }, { "status": "affected", "version": "11.5(1)SU1ES03" }, { "status": "affected", "version": "11.6(1)ES02" }, { "status": "affected", "version": "11.5(1)ES01" }, { "status": "affected", "version": "9.0(2)SU3ES04" }, { "status": "affected", "version": "10.6(1)SU2" }, { "status": "affected", "version": "10.6(1)SU2ES04" }, { "status": "affected", "version": "11.6(1)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES02" }, { "status": "affected", "version": "11.5(1)SU1ES02" }, { "status": "affected", "version": "11.5(1)SU1ES01" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "11.0(1)SU1ES02" }, { "status": "affected", "version": "12.5(1)_SU03_ES03" }, { "status": "affected", "version": "12.5(1)_SU03_ES04" }, { "status": "affected", "version": "12.5(1)_SU03_ES05" }, { "status": "affected", "version": "12.5(1)_SU03_ES06" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Intelligence Center", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "11.0(2)" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.6(1)_ET" }, { "status": "affected", "version": "12.6(1)_ES05_ET" }, { "status": "affected", "version": "11.0(3)" }, { "status": "affected", "version": "12.6(2)" }, { "status": "affected", "version": "12.6(2)_504_Issue_ET" }, { "status": "affected", "version": "12.6.1_ExcelIssue_ET" }, { "status": "affected", "version": "12.6(2)_Permalink_ET" }, { "status": "affected", "version": "12.6.2_CSCwk19536_ET" }, { "status": "affected", "version": "12.6.2_CSCwm96922_ET" }, { "status": "affected", "version": "12.6.2_Amq_OOS_ET" }, { "status": "affected", "version": "12.5(2)ET_CSCwi79933" }, { "status": "affected", "version": "12.6(2)_ET" }, { "status": "affected", "version": "12.6.2_CSCwn48501_ET" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unity Connection", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU4" }, { "status": "affected", "version": "14" }, { "status": "affected", "version": "12.5(1)SU5" }, { "status": "affected", "version": "14SU1" }, { "status": "affected", "version": "12.5(1)SU6" }, { "status": "affected", "version": "14SU2" }, { "status": "affected", "version": "12.5(1)SU7" }, { "status": "affected", "version": "14SU3" }, { "status": "affected", "version": "12.5(1)SU8" }, { "status": "affected", "version": "14SU3a" }, { "status": "affected", "version": "12.5(1)SU8a" }, { "status": "affected", "version": "15" }, { "status": "affected", "version": "15SU1" }, { "status": "affected", "version": "14SU4" }, { "status": "affected", "version": "12.5(1)SU9" } ] }, { "defaultStatus": "unknown", "product": "Cisco Virtualized Voice Browser", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.6(1)_ES84" }, { "status": "affected", "version": "11.5(1)_ES54" }, { "status": "affected", "version": "11.5(1)_ES27" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.5(1)ES36" }, { "status": "affected", "version": "12.0(1)_ES01" }, { "status": "affected", "version": "11.6(1)_ES85" }, { "status": "affected", "version": "12.5(1)_ES05" }, { "status": "affected", "version": "11.5(1)_ES32" }, { "status": "affected", "version": "11.6(1)_ES83" }, { "status": "affected", "version": "11.5(1)_ES29" }, { "status": "affected", "version": "12.0(1)_ES06" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.0(1)_ES07" }, { "status": "affected", "version": "11.6(1)_ES80" }, { "status": "affected", "version": "12.0(1)_ES05" }, { "status": "affected", "version": "11.5(1)_ES36" }, { "status": "affected", "version": "11.5(1)_ES53" }, { "status": "affected", "version": "12.5(1)_ES08" }, { "status": "affected", "version": "11.5(1)ES43" }, { "status": "affected", "version": "12.0(1)_ES03" }, { "status": "affected", "version": "11.6(1)_ES86" }, { "status": "affected", "version": "12.0(1)_ES04" }, { "status": "affected", "version": "11.5(1)ES27" }, { "status": "affected", "version": "12.5(1)_ES03" }, { "status": "affected", "version": "11.6(1)_ES88" }, { "status": "affected", "version": "12.5(1)_ES06" }, { "status": "affected", "version": "11.6(1)_ES82" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "11.5(1)ES29" }, { "status": "affected", "version": "12.5(1)_ES04" }, { "status": "affected", "version": "12.5(1)_ES07" }, { "status": "affected", "version": "11.6(1)_ES87" }, { "status": "affected", "version": "11.6(1)_ES81" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "11.6(1)_ES22" }, { "status": "affected", "version": "11.5(1)_ES43" }, { "status": "affected", "version": "11.5(1)ES32" }, { "status": "affected", "version": "12.0(1)_ES02" }, { "status": "affected", "version": "12.5(1)_ES02" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.5(1)_ES09" }, { "status": "affected", "version": "12.6(1)_ES01" }, { "status": "affected", "version": "12.0(1)_ES08" }, { "status": "affected", "version": "12.5(1)_ES10" }, { "status": "affected", "version": "12.6(1)_ES02" }, { "status": "affected", "version": "12.5(1)_ES11" }, { "status": "affected", "version": "12.5(1)_ES12" }, { "status": "affected", "version": "12.6(1)_ES03" }, { "status": "affected", "version": "12.5(1)_ES13" }, { "status": "affected", "version": "12.5(1)_ES14" }, { "status": "affected", "version": "12.6(1)_ES04" }, { "status": "affected", "version": "12.6(1)_ES05" }, { "status": "affected", "version": "12.5(1)_ES15" }, { "status": "affected", "version": "12.6(1)_ES06" }, { "status": "affected", "version": "12.6(1)_ET" }, { "status": "affected", "version": "12.5(1)_ES16" }, { "status": "affected", "version": "12.5(1)SU" }, { "status": "affected", "version": "12.5(1)_SU" }, { "status": "affected", "version": "12.5(1)_SU_ES01" }, { "status": "affected", "version": "12.6(1)_ES07" }, { "status": "affected", "version": "12.6(2)" }, { "status": "affected", "version": "12.5(1)_ES17" }, { "status": "affected", "version": "12.6(1)_ES08" }, { "status": "affected", "version": "12.6(1)_ES09" }, { "status": "affected", "version": "12.6(1)_ES10" }, { "status": "affected", "version": "12.5(1)_SU_ES02" }, { "status": "affected", "version": "12.6(2)_ES01" }, { "status": "affected", "version": "12.6(2)_ET01" }, { "status": "affected", "version": "12.5(2)_ET" }, { "status": "affected", "version": "12.6(2)_ES02" }, { "status": "affected", "version": "12.6(2)_ET_Streaming" }, { "status": "affected", "version": "12.6(2)ET_Transcribe" }, { "status": "affected", "version": "12.6(2)_ES03" }, { "status": "affected", "version": "12.6(2)ET_NuanceMix" }, { "status": "affected", "version": "12.6(2)ET_FileUpload" }, { "status": "affected", "version": "12.6(2)_ET02" }, { "status": "affected", "version": "12.6(2)_ES04" }, { "status": "affected", "version": "12.6.2ET_RTPfallback" }, { "status": "affected", "version": "12.6.2ET_CSCwf55306" }, { "status": "affected", "version": "12.6.2_ET_CSCwj36712" }, { "status": "affected", "version": "12.5.2 ET-CSCwj33374" }, { "status": "affected", "version": "12.5(1) SU ET" }, { "status": "affected", "version": "12.6(2)ET_CSCwj87296" }, { "status": "affected", "version": "12.6(2)_ES05" }, { "status": "affected", "version": "12.5.2_ET_CSCvz27014" }, { "status": "affected", "version": "12.6(2)_ET" }, { "status": "affected", "version": "12.6.2-ET" }, { "status": "affected", "version": "12.6(2)ET_CSCwk83135" }, { "status": "affected", "version": "12.6.2_ET_CX_ALAW" }, { "status": "affected", "version": "12.6.2-ET01-SSL" }, { "status": "affected", "version": "12.6(2)_ES06" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user.\r\n\r\nThis vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-04T16:18:20.661Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vos-command-inject-65s2UCYy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vos-command-inject-65s2UCYy" } ], "source": { "advisory": "cisco-sa-vos-command-inject-65s2UCYy", "defects": [ "CSCwk24029" ], "discovery": "EXTERNAL" }, "title": "Cisco Unified Communications Products Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20278", "datePublished": "2025-06-04T16:18:20.661Z", "dateReserved": "2024-10-10T19:15:13.246Z", "dateUpdated": "2025-06-06T03:55:32.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }