File Permission Vulnerability in Cisco APIC
CVE-2025-20119
6MEDIUM
Summary
A flaw in the file permission handling of Cisco APIC may allow a local attacker with valid administrative credentials to exploit a race condition. This vulnerability could enable the attacker to overwrite critical system files, leading to device instability and potential Denial of Service (DoS) conditions. Cisco has released software updates to mitigate this issue, highlighting the importance of timely patching to safeguard against unauthorized access and system disruptions.
Affected Version(s)
Cisco Application Policy Infrastructure Controller (APIC) 3.2(8d)
Cisco Application Policy Infrastructure Controller (APIC) 3.2(1m)
Cisco Application Policy Infrastructure Controller (APIC) 3.2(5e)
References
CVSS V3.1
Score:
6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved