CVE-2025-20119 (GCVE-0-2025-20119)
Vulnerability from cvelistv5
Published
2025-02-26 16:23
Modified
2025-03-03 19:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary
A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Application Policy Infrastructure Controller (APIC) |
Version: 3.2(8d) Version: 3.2(1m) Version: 3.2(5e) Version: 4.1(2m) Version: 3.2(41d) Version: 3.2(3s) Version: 4.0(3c) Version: 4.1(1k) Version: 3.2(4d) Version: 4.2(2e) Version: 4.2(3j) Version: 4.2(3n) Version: 4.0(1h) Version: 4.1(1l) Version: 3.2(9f) Version: 4.2(3l) Version: 4.2(2g) Version: 3.2(7k) Version: 3.2(9b) Version: 3.2(3j) Version: 4.1(2u) Version: 4.2(1l) Version: 4.1(1a) Version: 4.0(3d) Version: 3.2(4e) Version: 4.1(1i) Version: 3.2(5f) Version: 3.2(1l) Version: 4.2(1i) Version: 4.1(2o) Version: 4.2(1g) Version: 4.1(2g) Version: 4.2(2f) Version: 3.2(6i) Version: 3.2(3i) Version: 3.2(3n) Version: 4.1(2x) Version: 3.2(5d) Version: 4.2(3q) Version: 4.1(1j) Version: 4.1(2w) Version: 3.2(2o) Version: 3.2(3r) Version: 4.0(2c) Version: 4.1(2s) Version: 3.2(7f) Version: 3.2(3o) Version: 3.2(2l) Version: 4.2(1j) Version: 4.2(4i) Version: 3.2(9h) Version: 5.0(1k) Version: 4.2(4k) Version: 5.0(1l) Version: 5.0(2e) Version: 4.2(4o) Version: 4.2(4p) Version: 5.0(2h) Version: 4.2(5k) Version: 4.2(5l) Version: 4.2(5n) Version: 5.1(1h) Version: 4.2(6d) Version: 5.1(2e) Version: 4.2(6g) Version: 4.2(6h) Version: 5.1(3e) Version: 3.2(10e) Version: 4.2(6l) Version: 4.2(7f) Version: 5.1(4c) Version: 4.2(6o) Version: 5.2(1g) Version: 5.2(2e) Version: 4.2(7l) Version: 3.2(10f) Version: 5.2(2f) Version: 5.2(2g) Version: 4.2(7q) Version: 5.2(2h) Version: 5.2(3f) Version: 5.2(3e) Version: 5.2(3g) Version: 4.2(7r) Version: 4.2(7s) Version: 5.2(4d) Version: 5.2(4e) Version: 4.2(7t) Version: 5.2(5d) Version: 3.2(10g) Version: 5.2(5c) Version: 6.0(1g) Version: 4.2(7u) Version: 5.2(5e) Version: 5.2(4f) Version: 5.2(6e) Version: 6.0(1j) Version: 5.2(6g) Version: 5.2(7f) Version: 4.2(7v) Version: 5.2(7g) Version: 6.0(2h) Version: 4.2(7w) Version: 5.2(6h) Version: 5.2(4h) Version: 5.2(8d) Version: 6.0(2j) Version: 5.2(8e) Version: 6.0(3d) Version: 6.0(3e) Version: 5.2(8f) Version: 5.2(8g) Version: 5.3(1d) Version: 5.2(8h) Version: 6.0(4c) Version: 5.3(2a) Version: 5.2(8i) Version: 6.0(5h) Version: 5.3(2b) Version: 6.0(3g) Version: 6.0(5j) Version: 5.3(2c) Version: 6.0(6c) Version: 6.1(1f) Version: 6.0(7e) Version: 5.3(2d) Version: 6.0(8d) Version: 5.3(2e) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20119",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-26T17:21:01.401418Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-03T19:02:59.455Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Application Policy Infrastructure Controller (APIC)",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.2(8d)"
},
{
"status": "affected",
"version": "3.2(1m)"
},
{
"status": "affected",
"version": "3.2(5e)"
},
{
"status": "affected",
"version": "4.1(2m)"
},
{
"status": "affected",
"version": "3.2(41d)"
},
{
"status": "affected",
"version": "3.2(3s)"
},
{
"status": "affected",
"version": "4.0(3c)"
},
{
"status": "affected",
"version": "4.1(1k)"
},
{
"status": "affected",
"version": "3.2(4d)"
},
{
"status": "affected",
"version": "4.2(2e)"
},
{
"status": "affected",
"version": "4.2(3j)"
},
{
"status": "affected",
"version": "4.2(3n)"
},
{
"status": "affected",
"version": "4.0(1h)"
},
{
"status": "affected",
"version": "4.1(1l)"
},
{
"status": "affected",
"version": "3.2(9f)"
},
{
"status": "affected",
"version": "4.2(3l)"
},
{
"status": "affected",
"version": "4.2(2g)"
},
{
"status": "affected",
"version": "3.2(7k)"
},
{
"status": "affected",
"version": "3.2(9b)"
},
{
"status": "affected",
"version": "3.2(3j)"
},
{
"status": "affected",
"version": "4.1(2u)"
},
{
"status": "affected",
"version": "4.2(1l)"
},
{
"status": "affected",
"version": "4.1(1a)"
},
{
"status": "affected",
"version": "4.0(3d)"
},
{
"status": "affected",
"version": "3.2(4e)"
},
{
"status": "affected",
"version": "4.1(1i)"
},
{
"status": "affected",
"version": "3.2(5f)"
},
{
"status": "affected",
"version": "3.2(1l)"
},
{
"status": "affected",
"version": "4.2(1i)"
},
{
"status": "affected",
"version": "4.1(2o)"
},
{
"status": "affected",
"version": "4.2(1g)"
},
{
"status": "affected",
"version": "4.1(2g)"
},
{
"status": "affected",
"version": "4.2(2f)"
},
{
"status": "affected",
"version": "3.2(6i)"
},
{
"status": "affected",
"version": "3.2(3i)"
},
{
"status": "affected",
"version": "3.2(3n)"
},
{
"status": "affected",
"version": "4.1(2x)"
},
{
"status": "affected",
"version": "3.2(5d)"
},
{
"status": "affected",
"version": "4.2(3q)"
},
{
"status": "affected",
"version": "4.1(1j)"
},
{
"status": "affected",
"version": "4.1(2w)"
},
{
"status": "affected",
"version": "3.2(2o)"
},
{
"status": "affected",
"version": "3.2(3r)"
},
{
"status": "affected",
"version": "4.0(2c)"
},
{
"status": "affected",
"version": "4.1(2s)"
},
{
"status": "affected",
"version": "3.2(7f)"
},
{
"status": "affected",
"version": "3.2(3o)"
},
{
"status": "affected",
"version": "3.2(2l)"
},
{
"status": "affected",
"version": "4.2(1j)"
},
{
"status": "affected",
"version": "4.2(4i)"
},
{
"status": "affected",
"version": "3.2(9h)"
},
{
"status": "affected",
"version": "5.0(1k)"
},
{
"status": "affected",
"version": "4.2(4k)"
},
{
"status": "affected",
"version": "5.0(1l)"
},
{
"status": "affected",
"version": "5.0(2e)"
},
{
"status": "affected",
"version": "4.2(4o)"
},
{
"status": "affected",
"version": "4.2(4p)"
},
{
"status": "affected",
"version": "5.0(2h)"
},
{
"status": "affected",
"version": "4.2(5k)"
},
{
"status": "affected",
"version": "4.2(5l)"
},
{
"status": "affected",
"version": "4.2(5n)"
},
{
"status": "affected",
"version": "5.1(1h)"
},
{
"status": "affected",
"version": "4.2(6d)"
},
{
"status": "affected",
"version": "5.1(2e)"
},
{
"status": "affected",
"version": "4.2(6g)"
},
{
"status": "affected",
"version": "4.2(6h)"
},
{
"status": "affected",
"version": "5.1(3e)"
},
{
"status": "affected",
"version": "3.2(10e)"
},
{
"status": "affected",
"version": "4.2(6l)"
},
{
"status": "affected",
"version": "4.2(7f)"
},
{
"status": "affected",
"version": "5.1(4c)"
},
{
"status": "affected",
"version": "4.2(6o)"
},
{
"status": "affected",
"version": "5.2(1g)"
},
{
"status": "affected",
"version": "5.2(2e)"
},
{
"status": "affected",
"version": "4.2(7l)"
},
{
"status": "affected",
"version": "3.2(10f)"
},
{
"status": "affected",
"version": "5.2(2f)"
},
{
"status": "affected",
"version": "5.2(2g)"
},
{
"status": "affected",
"version": "4.2(7q)"
},
{
"status": "affected",
"version": "5.2(2h)"
},
{
"status": "affected",
"version": "5.2(3f)"
},
{
"status": "affected",
"version": "5.2(3e)"
},
{
"status": "affected",
"version": "5.2(3g)"
},
{
"status": "affected",
"version": "4.2(7r)"
},
{
"status": "affected",
"version": "4.2(7s)"
},
{
"status": "affected",
"version": "5.2(4d)"
},
{
"status": "affected",
"version": "5.2(4e)"
},
{
"status": "affected",
"version": "4.2(7t)"
},
{
"status": "affected",
"version": "5.2(5d)"
},
{
"status": "affected",
"version": "3.2(10g)"
},
{
"status": "affected",
"version": "5.2(5c)"
},
{
"status": "affected",
"version": "6.0(1g)"
},
{
"status": "affected",
"version": "4.2(7u)"
},
{
"status": "affected",
"version": "5.2(5e)"
},
{
"status": "affected",
"version": "5.2(4f)"
},
{
"status": "affected",
"version": "5.2(6e)"
},
{
"status": "affected",
"version": "6.0(1j)"
},
{
"status": "affected",
"version": "5.2(6g)"
},
{
"status": "affected",
"version": "5.2(7f)"
},
{
"status": "affected",
"version": "4.2(7v)"
},
{
"status": "affected",
"version": "5.2(7g)"
},
{
"status": "affected",
"version": "6.0(2h)"
},
{
"status": "affected",
"version": "4.2(7w)"
},
{
"status": "affected",
"version": "5.2(6h)"
},
{
"status": "affected",
"version": "5.2(4h)"
},
{
"status": "affected",
"version": "5.2(8d)"
},
{
"status": "affected",
"version": "6.0(2j)"
},
{
"status": "affected",
"version": "5.2(8e)"
},
{
"status": "affected",
"version": "6.0(3d)"
},
{
"status": "affected",
"version": "6.0(3e)"
},
{
"status": "affected",
"version": "5.2(8f)"
},
{
"status": "affected",
"version": "5.2(8g)"
},
{
"status": "affected",
"version": "5.3(1d)"
},
{
"status": "affected",
"version": "5.2(8h)"
},
{
"status": "affected",
"version": "6.0(4c)"
},
{
"status": "affected",
"version": "5.3(2a)"
},
{
"status": "affected",
"version": "5.2(8i)"
},
{
"status": "affected",
"version": "6.0(5h)"
},
{
"status": "affected",
"version": "5.3(2b)"
},
{
"status": "affected",
"version": "6.0(3g)"
},
{
"status": "affected",
"version": "6.0(5j)"
},
{
"status": "affected",
"version": "5.3(2c)"
},
{
"status": "affected",
"version": "6.0(6c)"
},
{
"status": "affected",
"version": "6.1(1f)"
},
{
"status": "affected",
"version": "6.0(7e)"
},
{
"status": "affected",
"version": "5.3(2d)"
},
{
"status": "affected",
"version": "6.0(8d)"
},
{
"status": "affected",
"version": "5.3(2e)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-26T17:13:44.068Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-apic-multi-vulns-9ummtg5",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5"
}
],
"source": {
"advisory": "cisco-sa-apic-multi-vulns-9ummtg5",
"defects": [
"CSCwk18865"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Application Policy Infrastructure Controller Authenticated Local Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20119",
"datePublished": "2025-02-26T16:23:37.170Z",
"dateReserved": "2024-10-10T19:15:13.211Z",
"dateUpdated": "2025-03-03T19:02:59.455Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Cisco Application Policy Infrastructure Controller Authenticated Local Denial of Service Vulnerability\", \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H\", \"baseScore\": 6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.\\r\\n\\r\\nThis vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5\", \"name\": \"cisco-sa-apic-multi-vulns-9ummtg5\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory.\"}], \"source\": {\"advisory\": \"cisco-sa-apic-multi-vulns-9ummtg5\", \"discovery\": \"EXTERNAL\", \"defects\": [\"CSCwk18865\"]}, \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)\", \"type\": \"cwe\", \"cweId\": \"CWE-362\"}]}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Application Policy Infrastructure Controller (APIC)\", \"versions\": [{\"version\": \"3.2(8d)\", \"status\": \"affected\"}, {\"version\": \"3.2(1m)\", \"status\": \"affected\"}, {\"version\": \"3.2(5e)\", \"status\": \"affected\"}, {\"version\": \"4.1(2m)\", \"status\": \"affected\"}, {\"version\": \"3.2(41d)\", \"status\": \"affected\"}, {\"version\": \"3.2(3s)\", \"status\": \"affected\"}, {\"version\": \"4.0(3c)\", \"status\": \"affected\"}, {\"version\": \"4.1(1k)\", \"status\": \"affected\"}, {\"version\": \"3.2(4d)\", \"status\": \"affected\"}, {\"version\": \"4.2(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(3j)\", \"status\": \"affected\"}, {\"version\": \"4.2(3n)\", \"status\": \"affected\"}, {\"version\": \"4.0(1h)\", \"status\": \"affected\"}, {\"version\": \"4.1(1l)\", \"status\": \"affected\"}, {\"version\": \"3.2(9f)\", \"status\": \"affected\"}, {\"version\": \"4.2(3l)\", \"status\": \"affected\"}, {\"version\": \"4.2(2g)\", \"status\": \"affected\"}, {\"version\": \"3.2(7k)\", \"status\": \"affected\"}, {\"version\": \"3.2(9b)\", \"status\": \"affected\"}, {\"version\": \"3.2(3j)\", \"status\": \"affected\"}, {\"version\": \"4.1(2u)\", \"status\": \"affected\"}, {\"version\": \"4.2(1l)\", \"status\": \"affected\"}, {\"version\": \"4.1(1a)\", \"status\": \"affected\"}, {\"version\": \"4.0(3d)\", \"status\": \"affected\"}, {\"version\": \"3.2(4e)\", \"status\": \"affected\"}, {\"version\": \"4.1(1i)\", \"status\": \"affected\"}, {\"version\": \"3.2(5f)\", \"status\": \"affected\"}, {\"version\": \"3.2(1l)\", \"status\": \"affected\"}, {\"version\": \"4.2(1i)\", \"status\": \"affected\"}, {\"version\": \"4.1(2o)\", \"status\": \"affected\"}, {\"version\": \"4.2(1g)\", \"status\": \"affected\"}, {\"version\": \"4.1(2g)\", \"status\": \"affected\"}, {\"version\": \"4.2(2f)\", \"status\": \"affected\"}, {\"version\": \"3.2(6i)\", \"status\": \"affected\"}, {\"version\": \"3.2(3i)\", \"status\": \"affected\"}, {\"version\": \"3.2(3n)\", \"status\": \"affected\"}, {\"version\": \"4.1(2x)\", \"status\": \"affected\"}, {\"version\": \"3.2(5d)\", \"status\": \"affected\"}, {\"version\": \"4.2(3q)\", \"status\": \"affected\"}, {\"version\": \"4.1(1j)\", \"status\": \"affected\"}, {\"version\": \"4.1(2w)\", \"status\": \"affected\"}, {\"version\": \"3.2(2o)\", \"status\": \"affected\"}, {\"version\": \"3.2(3r)\", \"status\": \"affected\"}, {\"version\": \"4.0(2c)\", \"status\": \"affected\"}, {\"version\": \"4.1(2s)\", \"status\": \"affected\"}, {\"version\": \"3.2(7f)\", \"status\": \"affected\"}, {\"version\": \"3.2(3o)\", \"status\": \"affected\"}, {\"version\": \"3.2(2l)\", \"status\": \"affected\"}, {\"version\": \"4.2(1j)\", \"status\": \"affected\"}, {\"version\": \"4.2(4i)\", \"status\": \"affected\"}, {\"version\": \"3.2(9h)\", \"status\": \"affected\"}, {\"version\": \"5.0(1k)\", \"status\": \"affected\"}, {\"version\": \"4.2(4k)\", \"status\": \"affected\"}, {\"version\": \"5.0(1l)\", \"status\": \"affected\"}, {\"version\": \"5.0(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(4o)\", \"status\": \"affected\"}, {\"version\": \"4.2(4p)\", \"status\": \"affected\"}, {\"version\": \"5.0(2h)\", \"status\": \"affected\"}, {\"version\": \"4.2(5k)\", \"status\": \"affected\"}, {\"version\": \"4.2(5l)\", \"status\": \"affected\"}, {\"version\": \"4.2(5n)\", \"status\": \"affected\"}, {\"version\": \"5.1(1h)\", \"status\": \"affected\"}, {\"version\": \"4.2(6d)\", \"status\": \"affected\"}, {\"version\": \"5.1(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(6g)\", \"status\": \"affected\"}, {\"version\": \"4.2(6h)\", \"status\": \"affected\"}, {\"version\": \"5.1(3e)\", \"status\": \"affected\"}, {\"version\": \"3.2(10e)\", \"status\": \"affected\"}, {\"version\": \"4.2(6l)\", \"status\": \"affected\"}, {\"version\": \"4.2(7f)\", \"status\": \"affected\"}, {\"version\": \"5.1(4c)\", \"status\": \"affected\"}, {\"version\": \"4.2(6o)\", \"status\": \"affected\"}, {\"version\": \"5.2(1g)\", \"status\": \"affected\"}, {\"version\": \"5.2(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(7l)\", \"status\": \"affected\"}, {\"version\": \"3.2(10f)\", \"status\": \"affected\"}, {\"version\": \"5.2(2f)\", \"status\": \"affected\"}, {\"version\": \"5.2(2g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7q)\", \"status\": \"affected\"}, {\"version\": \"5.2(2h)\", \"status\": \"affected\"}, {\"version\": \"5.2(3f)\", \"status\": \"affected\"}, {\"version\": \"5.2(3e)\", \"status\": \"affected\"}, {\"version\": \"5.2(3g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7r)\", \"status\": \"affected\"}, {\"version\": \"4.2(7s)\", \"status\": \"affected\"}, {\"version\": \"5.2(4d)\", \"status\": \"affected\"}, {\"version\": \"5.2(4e)\", \"status\": \"affected\"}, {\"version\": \"4.2(7t)\", \"status\": \"affected\"}, {\"version\": \"5.2(5d)\", \"status\": \"affected\"}, {\"version\": \"3.2(10g)\", \"status\": \"affected\"}, {\"version\": \"5.2(5c)\", \"status\": \"affected\"}, {\"version\": \"6.0(1g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7u)\", \"status\": \"affected\"}, {\"version\": \"5.2(5e)\", \"status\": \"affected\"}, {\"version\": \"5.2(4f)\", \"status\": \"affected\"}, {\"version\": \"5.2(6e)\", \"status\": \"affected\"}, {\"version\": \"6.0(1j)\", \"status\": \"affected\"}, {\"version\": \"5.2(6g)\", \"status\": \"affected\"}, {\"version\": \"5.2(7f)\", \"status\": \"affected\"}, {\"version\": \"4.2(7v)\", \"status\": \"affected\"}, {\"version\": \"5.2(7g)\", \"status\": \"affected\"}, {\"version\": \"6.0(2h)\", \"status\": \"affected\"}, {\"version\": \"4.2(7w)\", \"status\": \"affected\"}, {\"version\": \"5.2(6h)\", \"status\": \"affected\"}, {\"version\": \"5.2(4h)\", \"status\": \"affected\"}, {\"version\": \"5.2(8d)\", \"status\": \"affected\"}, {\"version\": \"6.0(2j)\", \"status\": \"affected\"}, {\"version\": \"5.2(8e)\", \"status\": \"affected\"}, {\"version\": \"6.0(3d)\", \"status\": \"affected\"}, {\"version\": \"6.0(3e)\", \"status\": \"affected\"}, {\"version\": \"5.2(8f)\", \"status\": \"affected\"}, {\"version\": \"5.2(8g)\", \"status\": \"affected\"}, {\"version\": \"5.3(1d)\", \"status\": \"affected\"}, {\"version\": \"5.2(8h)\", \"status\": \"affected\"}, {\"version\": \"6.0(4c)\", \"status\": \"affected\"}, {\"version\": \"5.3(2a)\", \"status\": \"affected\"}, {\"version\": \"5.2(8i)\", \"status\": \"affected\"}, {\"version\": \"6.0(5h)\", \"status\": \"affected\"}, {\"version\": \"5.3(2b)\", \"status\": \"affected\"}, {\"version\": \"6.0(3g)\", \"status\": \"affected\"}, {\"version\": \"6.0(5j)\", \"status\": \"affected\"}, {\"version\": \"5.3(2c)\", \"status\": \"affected\"}, {\"version\": \"6.0(6c)\", \"status\": \"affected\"}, {\"version\": \"6.1(1f)\", \"status\": \"affected\"}, {\"version\": \"6.0(7e)\", \"status\": \"affected\"}, {\"version\": \"5.3(2d)\", \"status\": \"affected\"}, {\"version\": \"6.0(8d)\", \"status\": \"affected\"}, {\"version\": \"5.3(2e)\", \"status\": \"affected\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-02-26T17:13:44.068Z\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20119\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-26T17:21:01.401418Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-26T18:33:37.394Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-20119\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"cisco\", \"dateReserved\": \"2024-10-10T19:15:13.211Z\", \"datePublished\": \"2025-02-26T16:23:37.170Z\", \"dateUpdated\": \"2025-03-03T19:02:59.455Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…