Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-20265 (GCVE-0-2025-20265)
Vulnerability from cvelistv5 – Published: 2025-08-14 16:30 – Updated: 2025-08-16 03:55- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Firepower Management Center |
Affected:
7.0.7
Affected: 7.7.0 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20265",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-14T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-16T03:55:50.492Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-08-16T00:52:15.820Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/"
},
{
"url": "https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/"
}
],
"title": "CVE Program Container",
"x_generator": {
"engine": "ADPogram 0.0.1"
}
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Firepower Management Center",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.0.7"
},
{
"status": "affected",
"version": "7.7.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.\u0026nbsp;\r\n\r\nThis vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high\u0026nbsp;privilege level.\r\nNote: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-14T16:30:03.286Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-fmc-radius-rce-TNBKf79",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79"
}
],
"source": {
"advisory": "cisco-sa-fmc-radius-rce-TNBKf79",
"defects": [
"CSCwo91250"
],
"discovery": "INTERNAL"
},
"title": "Cisco Secure Firewall Management Center Software Radius Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20265",
"datePublished": "2025-08-14T16:30:03.286Z",
"dateReserved": "2024-10-10T19:15:13.244Z",
"dateUpdated": "2025-08-16T03:55:50.492Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-20265\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-08-14T17:15:39.723\",\"lastModified\":\"2025-08-16T01:15:27.227\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.\u0026nbsp;\\r\\n\\r\\nThis vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high\u0026nbsp;privilege level.\\r\\nNote: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la implementaci\u00f3n del subsistema RADIUS del software Cisco Secure Firewall Management Center (FMC) podr\u00eda permitir que un atacante remoto no autenticado inyecte comandos de shell arbitrarios que son ejecutados por el dispositivo. Esta vulnerabilidad se debe a una gesti\u00f3n inadecuada de la entrada del usuario durante la fase de autenticaci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una entrada manipulada al introducir credenciales que se autenticar\u00e1n en el servidor RADIUS configurado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos con un alto nivel de privilegios. Nota: Para explotar esta vulnerabilidad, el software Cisco Secure FMC debe estar configurado para la autenticaci\u00f3n RADIUS para la interfaz de administraci\u00f3n web, la administraci\u00f3n SSH o ambas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44D21149-BF7B-4188-A336-49AA5683BDC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_firewall_management_center:7.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BBDBCE8-CD5E-48BD-B61B-A36376C5A585\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/\"}, {\"url\": \"https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/\"}], \"x_generator\": {\"engine\": \"ADPogram 0.0.1\"}, \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-08-16T00:52:15.820Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20265\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-14T18:05:43.209821Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-14T18:05:47.195Z\"}}], \"cna\": {\"title\": \"Cisco Secure Firewall Management Center Software Radius Remote Code Execution Vulnerability\", \"source\": {\"defects\": [\"CSCwo91250\"], \"advisory\": \"cisco-sa-fmc-radius-rce-TNBKf79\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 10, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Firepower Management Center\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.0.7\"}, {\"status\": \"affected\", \"version\": \"7.7.0\"}], \"defaultStatus\": \"unknown\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79\", \"name\": \"cisco-sa-fmc-radius-rce-TNBKf79\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.\u0026nbsp;\\r\\n\\r\\nThis vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high\u0026nbsp;privilege level.\\r\\nNote: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-74\", \"description\": \"Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-08-14T16:30:03.286Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-20265\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-16T03:55:50.492Z\", \"dateReserved\": \"2024-10-10T19:15:13.244Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2025-08-14T16:30:03.286Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-0708
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer au bulletin de l\u0027\u00e9diteur (cf. section Documentation) pour les syst\u00e8mes affect\u00e9s.",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20253"
},
{
"name": "CVE-2025-20148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20148"
},
{
"name": "CVE-2025-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20265"
},
{
"name": "CVE-2025-20134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20134"
},
{
"name": "CVE-2025-20263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20263"
},
{
"name": "CVE-2025-20127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20127"
},
{
"name": "CVE-2025-20133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20133"
},
{
"name": "CVE-2025-20136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20136"
},
{
"name": "CVE-2025-20254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20254"
},
{
"name": "CVE-2025-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20217"
},
{
"name": "CVE-2025-20224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20224"
},
{
"name": "CVE-2025-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20225"
},
{
"name": "CVE-2025-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20243"
},
{
"name": "CVE-2025-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20239"
},
{
"name": "CVE-2025-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20244"
},
{
"name": "CVE-2025-20222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20222"
},
{
"name": "CVE-2025-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20251"
},
{
"name": "CVE-2025-20252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20252"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0708",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-3100",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-radius-rce-TNBKf79",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-html-inj-MqjrZrny",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fp2k-IPsec-dos-tjwgdZCO",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-buffer-overflow-PyRUhWBC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-dos-SvKhtjgt",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-http-file-hUyX2jL4",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-ftd-ios-dos-DOESHWHy",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-ssltls-dos-eHw76vZe",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-nat-dns-dos-bqhynHTM",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-vpn-dos-mfPekA6e",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e"
}
]
}
CERTFR-2025-AVI-0708
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer au bulletin de l\u0027\u00e9diteur (cf. section Documentation) pour les syst\u00e8mes affect\u00e9s.",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20253"
},
{
"name": "CVE-2025-20148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20148"
},
{
"name": "CVE-2025-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20265"
},
{
"name": "CVE-2025-20134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20134"
},
{
"name": "CVE-2025-20263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20263"
},
{
"name": "CVE-2025-20127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20127"
},
{
"name": "CVE-2025-20133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20133"
},
{
"name": "CVE-2025-20136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20136"
},
{
"name": "CVE-2025-20254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20254"
},
{
"name": "CVE-2025-20217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20217"
},
{
"name": "CVE-2025-20224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20224"
},
{
"name": "CVE-2025-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20225"
},
{
"name": "CVE-2025-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20243"
},
{
"name": "CVE-2025-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20239"
},
{
"name": "CVE-2025-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20244"
},
{
"name": "CVE-2025-20222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20222"
},
{
"name": "CVE-2025-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20251"
},
{
"name": "CVE-2025-20252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20252"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0708",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-3100",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-radius-rce-TNBKf79",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-html-inj-MqjrZrny",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fp2k-IPsec-dos-tjwgdZCO",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-buffer-overflow-PyRUhWBC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-dos-SvKhtjgt",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-http-file-hUyX2jL4",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-ftd-ios-dos-DOESHWHy",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-ssltls-dos-eHw76vZe",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-nat-dns-dos-bqhynHTM",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-vpn-dos-mfPekA6e",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e"
}
]
}
CISCO-SA-FMC-RADIUS-RCE-TNBKF79
Vulnerability from csaf_cisco - Published: 2025-08-14 16:00 - Updated: 2025-08-14 16:00Notes
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was found by Brandon Sakai of Cisco during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.\r\n\r\nThis vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level.\r\n\r\nNote: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n\r\n\r\nThis advisory is part of the August 2025 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2025 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75415\"].",
"title": "Summary"
},
{
"category": "general",
"text": "This vulnerability affects only Cisco Secure FMC Software releases 7.0.7 and 7.7.0 if they have RADIUS authentication enabled. For instructions on how to check whether RADIUS is configured, see the Add a RADIUS External Authentication Object for Management Center [\"https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/770/management-center-admin-77/system-users.html#id_63677\"] section of the Cisco Secure Firewall Management Center Administration Guide.\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco Secure Firewall Adaptive Security Appliance (ASA) Software or Cisco Secure Firewall Threat Defense (FTD) Software.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.\r\n\r\nHowever, this vulnerability can be exploited only if RADIUS authentication is configured on Cisco Secure FMC Software. To mitigate this vulnerability, use another type of authentication, such as local user accounts, external LDAP authentication, or SAML single sign-on (SSO). For more information, see the Cisco Secure Firewall Management Center Administration Guide [\"https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/770/management-center-admin-77.html\"].\r\n\r\nWhile this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu\"] that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.\r\n\r\nCustomers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nThe Cisco Support and Downloads page [\"https://www.cisco.com/c/en/us/support/index.html\"] on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"]. This tool identifies any Cisco security advisories that impact a specific software release and the earliest release that fixes the vulnerabilities that are described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities that are described in all the advisories that the Software Checker identifies (\u201cCombined First Fixed\u201d).\r\n\r\nTo use the tool, go to the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] page and follow the instructions. Alternatively, use the following form to search for vulnerabilities that affect a specific software release. To use the form, follow these steps:\r\n\r\nChoose which advisories the tool will search\u2014all advisories, only advisories with a Critical or High Security Impact Rating (SIR) [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#asr\"], or only this advisory.\r\nChoose the appropriate software.\r\nChoose the appropriate platform.\r\nEnter a release number\u2014for example, 9.20.3.4 for Cisco Secure Firewall ASA Software or 7.4.2 for Cisco Secure FTD Software.\r\nClick Check.\r\n Only this advisory All Critical and High advisories All advisories Cisco ASA Software Cisco FMC Software Cisco FTD Software Any Platform 3000 Series Industrial Security Appliances (ISA) ASA 5500-X Series Firewalls ASA Service Module Adaptive Security Virtual Appliance (ASAv) Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9000 Series Firepower NGFW Virtual Secure Firewall 1200 Series Secure Firewall 3100 Series Secure Firewall 4200 Series Firepower Management Center Appliances\r\n\r\n\r\n\r\n\r\n Additional Resources\r\nFor help determining the best Cisco Secure Firewall ASA, Secure FMC, or Secure FTD Software release, see the following Recommended Releases documents. If a security advisory recommends a later release, Cisco recommends following the advisory guidance.\r\n\r\nCisco Secure Firewall ASA Compatibility [\"https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html\"]\r\nCisco Secure Firewall ASA Upgrade Guide [\"https://www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.html\"]\r\nCisco Secure Firewall Threat Defense Compatibility Guide [\"https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/compatibility/threat-defense-compatibility.html\"]",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was found by Brandon Sakai of Cisco during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79"
},
{
"category": "external",
"summary": "Cisco Event Response: August 2025 Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75415"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "Add a RADIUS External Authentication Object for Management Center",
"url": "https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/770/management-center-admin-77/system-users.html#id_63677"
},
{
"category": "external",
"summary": "Cisco Secure Firewall Management Center Administration Guide",
"url": "https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/770/management-center-admin-77.html"
},
{
"category": "external",
"summary": "free software updates",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "Cisco Support and Downloads page",
"url": "https://www.cisco.com/c/en/us/support/index.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Cisco Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Security Impact Rating (SIR)",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#asr"
},
{
"category": "external",
"summary": "Cisco Secure Firewall ASA Compatibility",
"url": "https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html"
},
{
"category": "external",
"summary": "Cisco Secure Firewall ASA Upgrade Guide",
"url": "https://www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.html"
},
{
"category": "external",
"summary": "Cisco Secure Firewall Threat Defense Compatibility Guide",
"url": "https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/compatibility/threat-defense-compatibility.html"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"
}
],
"title": "Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability",
"tracking": {
"current_release_date": "2025-08-14T16:00:00+00:00",
"generator": {
"date": "2025-08-20T20:59:12+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-fmc-radius-rce-TNBKf79",
"initial_release_date": "2025-08-14T16:00:00+00:00",
"revision_history": [
{
"date": "2025-08-14T15:53:41+00:00",
"number": "1.0.0",
"summary": "Initial public release."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "7.0.7",
"product": {
"name": "7.0.7",
"product_id": "CSAFPID-303302"
}
}
],
"category": "product_version",
"name": "7.0"
},
{
"branches": [
{
"category": "service_pack",
"name": "7.7.0",
"product": {
"name": "7.7.0",
"product_id": "CSAFPID-303351"
}
}
],
"category": "product_version",
"name": "7.7"
}
],
"category": "product_family",
"name": "Cisco Firepower Management Center"
},
{
"category": "product_name",
"name": "Cisco Firepower Management Center Appliances",
"product": {
"name": "Cisco Firepower Management Center Appliances",
"product_id": "CSAFPID-277516"
}
}
],
"category": "vendor",
"name": "Cisco"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Management Center 7.0.7 when installed on Cisco Firepower Management Center Appliances",
"product_id": "CSAFPID-303302:277516"
},
"product_reference": "CSAFPID-303302",
"relates_to_product_reference": "CSAFPID-277516"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Management Center 7.7.0 when installed on Cisco Firepower Management Center Appliances",
"product_id": "CSAFPID-303351:277516"
},
"product_reference": "CSAFPID-303351",
"relates_to_product_reference": "CSAFPID-277516"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-20265",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCwo91250"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-303302:277516",
"CSAFPID-303351:277516"
]
},
"release_date": "2025-08-14T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-303302:277516",
"CSAFPID-303351:277516"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-303302:277516",
"CSAFPID-303351:277516"
]
}
],
"title": "Cisco Secure Firewall Management Center Software Radius Remote Code Execution Vulnerability"
}
]
}
FKIE_CVE-2025-20265
Vulnerability from fkie_nvd - Published: 2025-08-14 17:15 - Updated: 2025-08-16 01:15| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/ |
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | secure_firewall_management_center | 7.0.7 | |
| cisco | secure_firewall_management_center | 7.7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "44D21149-BF7B-4188-A336-49AA5683BDC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBDBCE8-CD5E-48BD-B61B-A36376C5A585",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.\u0026nbsp;\r\n\r\nThis vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high\u0026nbsp;privilege level.\r\nNote: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la implementaci\u00f3n del subsistema RADIUS del software Cisco Secure Firewall Management Center (FMC) podr\u00eda permitir que un atacante remoto no autenticado inyecte comandos de shell arbitrarios que son ejecutados por el dispositivo. Esta vulnerabilidad se debe a una gesti\u00f3n inadecuada de la entrada del usuario durante la fase de autenticaci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una entrada manipulada al introducir credenciales que se autenticar\u00e1n en el servidor RADIUS configurado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos con un alto nivel de privilegios. Nota: Para explotar esta vulnerabilidad, el software Cisco Secure FMC debe estar configurado para la autenticaci\u00f3n RADIUS para la interfaz de administraci\u00f3n web, la administraci\u00f3n SSH o ambas."
}
],
"id": "CVE-2025-20265",
"lastModified": "2025-08-16T01:15:27.227",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2025-08-14T17:15:39.723",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-74"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
NCSC-2025-0264
Vulnerability from csaf_ncscnl - Published: 2025-08-15 08:52 - Updated: 2025-08-15 08:52Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Secure Firewall Software (inclusief ASA en FTD).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich in de manier waarop Cisco Secure Firewall de sleutel uitwisseling afhandeld (IKEv2), hiermee is het mogelijk voor een ongeauthenticeerde aanvaller om een Denial-of-Service aanval uit te voeren. De kwetsbaarheid met kenmerk CVE-2025-20265 bevind zich in de implementatie van het RADIUS-subsysteem, hierdoor is het mogelijk voor een ongeauthenticeerde kwaadwillende om willekeurige commando\u0027s uit te voeren op het onderliggende systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Cisco heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Neutralization of Expression/Command Delimiters",
"title": "CWE-146"
},
{
"category": "general",
"text": "Internal Asset Exposed to Unsafe Debug Access Level or State",
"title": "CWE-1244"
},
{
"category": "general",
"text": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)",
"title": "CWE-643"
},
{
"category": "general",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "general",
"text": "Improper Handling of Values",
"title": "CWE-229"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75415"
}
],
"title": "Kwetsbaarheden verholpen in Cisco Secure Firewall Software",
"tracking": {
"current_release_date": "2025-08-15T08:52:41.012811Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0264",
"initial_release_date": "2025-08-15T08:52:41.012811Z",
"revision_history": [
{
"date": "2025-08-15T08:52:41.012811Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:cisco/unknown",
"product": {
"name": "vers:cisco/unknown",
"product_id": "CSAFPID-3054139"
}
}
],
"category": "product_name",
"name": "Cisco Firepower Management Center Appliances"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/7.7.0",
"product": {
"name": "vers:unknown/7.7.0",
"product_id": "CSAFPID-3053803"
}
}
],
"category": "product_name",
"name": "Cisco Firepower Threat Defense Software"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:cisco/unknown",
"product": {
"name": "vers:cisco/unknown",
"product_id": "CSAFPID-1753655"
}
}
],
"category": "product_name",
"name": "Cisco Secure Firewall 3100 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:cisco/unknown",
"product": {
"name": "vers:cisco/unknown",
"product_id": "CSAFPID-1753671"
}
}
],
"category": "product_name",
"name": "Cisco Secure Firewall 4200 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.23.1",
"product": {
"name": "vers:unknown/9.23.1",
"product_id": "CSAFPID-3053795"
}
}
],
"category": "product_name",
"name": "Cisco Adaptive Security Appliance (ASA) Software"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:cisco/unknown",
"product": {
"name": "vers:cisco/unknown",
"product_id": "CSAFPID-2818039"
}
}
],
"category": "product_name",
"name": "Cisco Adaptive Security Virtual Appliance (ASAv)"
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-20127",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20127 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20127.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20127"
},
{
"cve": "CVE-2025-20133",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20133"
},
{
"cve": "CVE-2025-20134",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20134 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20134.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20134"
},
{
"cve": "CVE-2025-20135",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20135 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20135"
},
{
"cve": "CVE-2025-20136",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20136 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20136.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20136"
},
{
"cve": "CVE-2025-20148",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20148 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20148.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20148"
},
{
"cve": "CVE-2025-20217",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20217 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20217.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20217"
},
{
"cve": "CVE-2025-20218",
"cwe": {
"id": "CWE-643",
"name": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)",
"title": "CWE-643"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20218 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20218"
},
{
"cve": "CVE-2025-20219",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20219 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20219"
},
{
"cve": "CVE-2025-20220",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20220 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20220.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20220"
},
{
"cve": "CVE-2025-20222",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20222 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20222.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20222"
},
{
"cve": "CVE-2025-20224",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20224 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20224.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20224"
},
{
"cve": "CVE-2025-20225",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20225 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20225.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20225"
},
{
"cve": "CVE-2025-20235",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20235 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20235.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20235"
},
{
"cve": "CVE-2025-20237",
"cwe": {
"id": "CWE-146",
"name": "Improper Neutralization of Expression/Command Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Expression/Command Delimiters",
"title": "CWE-146"
},
{
"category": "other",
"text": "Internal Asset Exposed to Unsafe Debug Access Level or State",
"title": "CWE-1244"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20237 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20237"
},
{
"cve": "CVE-2025-20238",
"cwe": {
"id": "CWE-1244",
"name": "Internal Asset Exposed to Unsafe Debug Access Level or State"
},
"notes": [
{
"category": "other",
"text": "Internal Asset Exposed to Unsafe Debug Access Level or State",
"title": "CWE-1244"
},
{
"category": "other",
"text": "Improper Neutralization of Expression/Command Delimiters",
"title": "CWE-146"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20238 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20238"
},
{
"cve": "CVE-2025-20239",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20239 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20239.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20239"
},
{
"cve": "CVE-2025-20243",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20243 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20243"
},
{
"cve": "CVE-2025-20244",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20244 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20244.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20244"
},
{
"cve": "CVE-2025-20251",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20251 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20251"
},
{
"cve": "CVE-2025-20252",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20252 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20252.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20252"
},
{
"cve": "CVE-2025-20253",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20253 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20253.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20253"
},
{
"cve": "CVE-2025-20254",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20254 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20254"
},
{
"cve": "CVE-2025-20263",
"cwe": {
"id": "CWE-680",
"name": "Integer Overflow to Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20263 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20263.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20263"
},
{
"cve": "CVE-2025-20265",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20265 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20265.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20265"
},
{
"cve": "CVE-2025-20268",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Values",
"title": "CWE-229"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20268 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20268.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20268"
},
{
"cve": "CVE-2025-20301",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20301 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20301.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20301"
},
{
"cve": "CVE-2025-20302",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20302 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20302.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20302"
},
{
"cve": "CVE-2025-20306",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20306 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20306.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3054139",
"CSAFPID-3053803",
"CSAFPID-1753655",
"CSAFPID-1753671",
"CSAFPID-3053795",
"CSAFPID-2818039"
]
}
],
"title": "CVE-2025-20306"
}
]
}
GHSA-RC2H-JCR9-JM85
Vulnerability from github – Published: 2025-08-14 18:31 – Updated: 2025-08-16 03:30A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.
This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level. Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.
{
"affected": [],
"aliases": [
"CVE-2025-20265"
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-14T17:15:39Z",
"severity": "CRITICAL"
},
"details": "A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.\u0026nbsp;\n\nThis vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high\u0026nbsp;privilege level.\nNote: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.",
"id": "GHSA-rc2h-jcr9-jm85",
"modified": "2025-08-16T03:30:31Z",
"published": "2025-08-14T18:31:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20265"
},
{
"type": "WEB",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79"
},
{
"type": "WEB",
"url": "https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center"
},
{
"type": "WEB",
"url": "https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.