FKIE_CVE-2025-20181
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-08-04 18:51
Severity ?
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.
This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.
Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "189B0C7C-D794-43EB-A6C6-F29C4B9623A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
"matchCriteriaId": "7D00EB0E-92D3-4C5B-B107-730B47BD6E01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7F6A52-9AA9-4441-A137-7EE3470C155C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
"matchCriteriaId": "92CEEA13-0B40-4203-8BAE-09374C9B1FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
"matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
"matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
"matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
"matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
"matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
"matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*",
"matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*",
"matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2842F6-4CD5-457C-AC75-241A5AB9534B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
"matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
"matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
"matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB8C3BBA-4829-4006-B7EB-F552D86922C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "58F396D6-9B6E-4E6A-B561-9822DB13C7AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3AE0C5-D071-44B4-B820-422296FDC259",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el software Cisco IOS para los switches Cisco Catalyst de las series 2960X, 2960XR, 2960CX y 3560CX podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15, o uno no autenticado con acceso f\u00edsico al dispositivo, ejecute c\u00f3digo persistente durante el arranque y rompa la cadena de confianza. Esta vulnerabilidad se debe a la falta de verificaci\u00f3n de firmas para archivos espec\u00edficos que pueden cargarse durante el arranque del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad colocando un archivo manipulado en una ubicaci\u00f3n espec\u00edfica del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario durante el arranque. Dado que esto permite al atacante eludir una importante funci\u00f3n de seguridad del dispositivo, Cisco ha elevado la calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso de media a alta."
}
],
"id": "CVE-2025-20181",
"lastModified": "2025-08-04T18:51:54.673",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2025-05-07T18:15:37.973",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…