Cisco APIC Vulnerability Exposes Sensitive Information to Local Attackers
CVE-2025-20118

4.4MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
26 February 2025

Badges

👾 Exploit Exists

Summary

A security flaw in the internal processes of Cisco APIC can enable an authenticated, local attacker to gain access to sensitive data displayed through system CLI commands. This vulnerability stems from insufficient masking mechanisms, which could be exploited through reconnaissance techniques. An attacker with valid administrative credentials can use this weakness to reveal sensitive information that may facilitate further attacks. Cisco has recommended software updates to mitigate this risk, as there are no effective workarounds.

Affected Version(s)

Cisco Application Policy Infrastructure Controller (APIC) 3.2(8d)

Cisco Application Policy Infrastructure Controller (APIC) 3.2(1m)

Cisco Application Policy Infrastructure Controller (APIC) 3.2(5e)

References

CVSS V3.1

Score:
4.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.