FKIE_CVE-2025-20117
Vulnerability from fkie_nvd - Published: 2025-02-26 17:15 - Updated: 2025-07-31 17:37
Severity ?
5.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco APIC could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B98F6DE0-E0BB-4964-8A05-C65F5165621B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D70E3895-DCB3-4172-B98C-6E40F0A4F418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6CAD7459-DE32-4CCD-8FD9-E51E78F5E6A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AB7047CE-3246-4148-A976-816F52955EA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "195681EC-2C51-4E03-9D6B-98775F91CCDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2159857F-B8BA-4C08-B3B0-F94D391A6396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3110702B-17B0-4CC0-ACF1-373E46B434B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4DC07AC-B0E9-4963-843E-FFA9461FFBB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3r\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99D0E93D-8D70-4232-85B5-916DF9094FC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "43499579-9B0B-439E-8E75-18E7B42799FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D7F5A4B6-B2E7-419F-A051-CBA3EC4A36C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "41FEF58C-6E55-4B50-A26A-0D6CC162572B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFD7A2FE-4858-4929-98CF-D830D5ADC570",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF6ABA87-08F5-4C89-B0A2-D209B6305E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "01076AAB-79F9-40B8-BE1F-411EED87867A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(6i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76E4E4F2-9567-471E-AC73-5CD6AD338C95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FEAD3085-3271-4E28-9E55-2ED813D796F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80ADB11A-4D8C-4C2D-A483-E5BCD0B52B45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(8d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF518C44-E1F8-4443-9D73-D620158E7946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "569D4548-EE9D-4F33-A6EE-21A7ADF2514E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "46F2A714-DA33-449E-9C99-C8D8C15647D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A36D5184-55D1-4CBA-91BC-5E077FB07E3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D155016D-6988-4489-A4A1-BFDFB8F702A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1C036D5F-67EE-45CE-8D47-2BF483A14922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B468C9AE-396E-445B-AC5D-EAB1BB8EDFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(41d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3686F336-5D02-4984-B465-762EA7AB747D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(1h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA2A1A67-093B-4B8D-92EC-74BBDEDC91AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(2c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6D53DB7-C376-481B-9FF5-745290EE2F4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A59205CF-AB56-4902-BE58-2823B432A32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF203A26-8EE3-4570-89EB-2C06F228222D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0530224D-F85F-41CD-ADF9-29DF060C3BA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "807B4B19-7346-4F9A-AC07-ACC9F1AE145E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5775342D-C7A7-454E-BE3C-D0BF0C045C20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9496DBE9-0688-49F4-9A13-6AB427BB3663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2DFEF7C4-26F5-4F58-9063-811247E40EAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9863BBC-56C8-44FC-B30A-5D12C74B3779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4E54667F-863C-4FC7-8DF2-5515D6766B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93D1B627-4C61-4A86-8C39-D5C1152F0EE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "632F2791-A9E9-4902-9F5F-51F5D8A025AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2u\\):*:*:*:*:*:*:*",
"matchCriteriaId": "511B92C9-9E6D-4919-9CF3-BCAE7802B5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2w\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69D2E5F9-6A86-4F9A-9E71-BA682301D1AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2x\\):*:*:*:*:*:*:*",
"matchCriteriaId": "706A76CD-F18D-4B95-B996-B0160A91CD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "46CDDD7F-018A-4AD7-BBE2-F8602F2BA931",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C47A6A0E-84B9-4DE4-98EB-1065E18C2D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AA157F60-606D-4A5C-8437-D7970C7FA8D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "87ED09DD-8305-4CF9-B174-644AC585C92B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF98D3C8-A0C6-46EA-9B62-3850868B36A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9BD24A82-0BF7-4B90-BA36-BD6AB204304B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0EA99D3C-21C0-4432-AE97-8F750C8D4D2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "095A0E88-E216-4070-A458-8ED6041469B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9E0FDA1-5C75-4683-B24C-4486EC7E3E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CCD0F519-2B3B-4AF1-BC30-12B8F5F0F54A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8376ED28-4A53-4E54-94C2-B1C2A744729B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "961D987E-71F7-4CF4-BDAA-0B6ABDEF05D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A584271A-0F2B-4B55-A14B-FA55BC8BD981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D87AD83-B69E-4C79-9362-984FBD4096B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4p\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3930A258-9C03-49E0-B935-136847EF05E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7821B4A2-FFF5-4E2E-B360-9000DD0A1980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "08254391-0BEC-4110-8AAF-44B66E76569B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A8CCC02-5269-47CA-9DEE-FB9DF0AEAC93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0BB6B9B5-9B85-49FC-83F6-3CD2C3B92D0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A5627AF1-FB65-44F1-A7E2-98D6B2767887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF23AD6E-B875-4895-BC82-EA6305927487",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B8418157-E12F-4F97-9FAE-601C9BE25D0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "270B4C0E-796A-43B3-B3BE-D8C0DF0C0F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E9FDB03C-8B6F-46B2-930A-BD105E41D2FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9FA2AA37-6DA9-43D8-9D21-E1ECED85A509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5088B144-3349-4E6F-8978-B96FA7AC420F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7r\\):*:*:*:*:*:*:*",
"matchCriteriaId": "08791B2A-6B2F-4BAE-9E9B-0B2E5F8B610D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3067079-4CE4-4F29-BFDB-2CDACD003BD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4CC183AB-16F7-4C43-8F2F-F7508005A82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7u\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FB58D50B-68C3-40A3-8E0C-151511E22978",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7v\\):*:*:*:*:*:*:*",
"matchCriteriaId": "693E0E3A-0AA3-4556-930F-79A13A4506ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7w\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0875EE60-A0CE-44C2-AE3A-42BF383BA710",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B412D14-9F6F-4608-8CF8-3AE74A694BA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB19FC9F-C52E-48B5-B6F5-5B39F016DC18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "091E80DF-2FCF-466D-8D41-A6F5513C0180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F1BBC0EE-5C05-4E88-95CC-2FEB7ABE95C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(1h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7587DDE3-79E4-4A7A-B02D-D407B99B6CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1C4E68E4-7893-4DC3-9464-03689AEBB2BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(3e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DE195AC-67AA-45CD-8F81-96B5B4859869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(4c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "35BFCBA5-DDA2-4DC6-BD12-CF1D58CB73F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(1g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "92295C80-3DEB-47C8-A26F-CFA156C88B34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CD9A687B-642A-4646-A85C-8F5C41B8CD15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "697D5222-9FDC-430A-B4AD-18C43606B59B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4ABB3875-2D9B-4EF5-9DF5-0E7C2E180167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4D660DE6-B3F1-498D-9F0C-919D4FD81913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BEE0A24-B301-4693-965B-9EDF4FB3E652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "832E8780-1C4F-42EE-B3DB-C36D5C39330A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BA0E35AD-664F-4A1B-A651-9A6D6699133E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B487C5E8-FCDB-4EDC-85A0-69B9143B8C24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B1DA2E2F-D519-46E1-AF0F-1B068EE8CF41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19E2370A-EDBD-4F39-9AA2-BB1B48DBC6F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B13102E2-A4B5-4E8E-AFBF-7D2824DF07D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E304F25-6F50-4C86-B488-F3CB80601FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A56BE783-4995-4EE9-90C8-6BAE73588A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EE12D57D-B08E-46DE-9048-F608B1D0432A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "36DD76D9-2703-40AF-B154-9F3A268473D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2AFA2721-32D2-4877-BCAB-8E965AAB0B28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CC4FB4EB-87BE-4A1B-AB68-9B12F2372090",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8638CF95-3422-4F8D-AE5D-FF7F76BFC456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "857F16AE-D927-44E8-B268-F7A2FC4503B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B178BD85-E906-4D5E-9710-22C394038EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FC7D76A6-9CEF-4E74-A991-37725A46A045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "224C813A-61E2-4FE7-A012-8C50D90CB633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7D57E315-9795-4AB2-A36D-1979AA3B65E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "010B771A-30B2-4892-B028-08C9AEC170BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94AEA808-C9C3-4C54-A717-6FB3BC4A32EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA3ED35C-255F-43D3-A9A9-81AAEA1F3AFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6B1284FC-805B-4C57-931A-BA422A648777",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4BD6BCF2-81B0-4118-9C34-55AEFFAB62BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7CCD0606-F883-469B-BA82-B372B2F33D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F69DA2D-379F-437A-9284-B5C98BC9F94D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1FF93B-35F0-4CA9-8A7F-4B4B732A81D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7699F8E-2A17-421E-8078-7EBECE7C2768",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C01F1006-7409-459F-A947-7D68D483CCC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7839A222-2CC0-495D-97E6-2421BFB0B948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "11F64391-5096-478C-A955-169F4AEBDC55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF29E5EB-2497-4136-9BC7-7E75A6180245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1B7CC4CE-1FF6-45BB-AAC7-367593586AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "64CFF745-E48F-44B9-8C22-12644F0FF06E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(4c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97954FE9-2CBF-4016-8FDD-CE7423A65BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6714932-BC33-41D0-8032-7ED387C6F80C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "23C425D3-CF4A-4D2D-9FD6-E7B9A9927ED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(6c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C91678F6-6BF7-4158-9FBD-6C439BE54D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(7e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "291A6AB2-121A-49AE-94E0-C9A76A87D48A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(8d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7C4E7075-9EFE-4573-A5E5-F15E622A16A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.1\\(1f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0B3DA1C0-01DB-4773-81EC-A8574030FC59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco APIC could allow an authenticated, local attacker to execute arbitrary commands as root\u0026nbsp;on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la CLI de Cisco APIC podr\u00eda permitir que un atacante local autenticado ejecute comandos arbitrarios como superusuario en el sistema operativo subyacente de un dispositivo afectado. Para explotar esta vulnerabilidad, el atacante debe tener credenciales administrativas v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los argumentos que se pasan a comandos CLI espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad al incluir una entrada manipulada como argumento de un comando CLI afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante ejecute comandos arbitrarios en el sistema operativo subyacente con los privilegios de superusuario."
}
],
"id": "CVE-2025-20117",
"lastModified": "2025-07-31T17:37:13.113",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 4.2,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-02-26T17:15:22.567",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…