Refine your search

1 vulnerability found for Cisco ThousandEyes Enterprise Agent by Cisco

CVE-2026-20161 (GCVE-0-2026-20161)
Vulnerability from cvelistv5
Published
2026-04-15 16:03
Modified
2026-04-15 16:56
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Summary
A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent could allow an authenticated, local attacker with low privileges to overwrite arbitrary files on the local system of an affected device. This vulnerability is due to improper access controls on files that are on the local file system of an affected device. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system. A successful exploit could allow the attacker to bypass file system permissions and overwrite arbitrary files on the affected device.
Impacted products
Vendor Product Version
Cisco Cisco ThousandEyes Enterprise Agent Version: Agent 5.0
Version: Agent 4.4.4
Version: Agent 4.4.3
Version: Agent 4.4.2
Version: Agent 4.2
Version: Agent 4.1
Version: Agent 4.0
Version: Agent 5.1
Version: Agent 5.1.2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20161",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-15T16:54:35.119090Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-15T16:56:35.191Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco ThousandEyes Enterprise Agent",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "Agent 5.0"
            },
            {
              "status": "affected",
              "version": "Agent 4.4.4"
            },
            {
              "status": "affected",
              "version": "Agent 4.4.3"
            },
            {
              "status": "affected",
              "version": "Agent 4.4.2"
            },
            {
              "status": "affected",
              "version": "Agent 4.2"
            },
            {
              "status": "affected",
              "version": "Agent 4.1"
            },
            {
              "status": "affected",
              "version": "Agent 4.0"
            },
            {
              "status": "affected",
              "version": "Agent 5.1"
            },
            {
              "status": "affected",
              "version": "Agent 5.1.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent could allow an authenticated, local attacker with low privileges to overwrite arbitrary files on the local system of an affected device.\r\n\r\nThis vulnerability is due to improper access controls on files that are on the local file system\u0026nbsp;of an affected device. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system. A successful exploit could allow the attacker to bypass file system permissions and overwrite arbitrary files on the affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-15T16:03:43.769Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-te-agentfilewrite-tqUw3SMU",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-agentfilewrite-tqUw3SMU"
        }
      ],
      "source": {
        "advisory": "cisco-sa-te-agentfilewrite-tqUw3SMU",
        "defects": [
          "CSCwt14485"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco ThousandEyes Enterprise Agent Arbitrary File Overwrite Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20161",
    "datePublished": "2026-04-15T16:03:43.769Z",
    "dateReserved": "2025-10-08T11:59:15.388Z",
    "dateUpdated": "2026-04-15T16:56:35.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}