File Permission Vulnerability in Cisco APIC
CVE-2025-20119

6MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
26 February 2025

Badges

👾 Exploit Exists

Summary

A flaw in the file permission handling of Cisco APIC may allow a local attacker with valid administrative credentials to exploit a race condition. This vulnerability could enable the attacker to overwrite critical system files, leading to device instability and potential Denial of Service (DoS) conditions. Cisco has released software updates to mitigate this issue, highlighting the importance of timely patching to safeguard against unauthorized access and system disruptions.

Affected Version(s)

Cisco Application Policy Infrastructure Controller (APIC) 3.2(8d)

Cisco Application Policy Infrastructure Controller (APIC) 3.2(1m)

Cisco Application Policy Infrastructure Controller (APIC) 3.2(5e)

References

CVSS V3.1

Score:
6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.