We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20155



Description

A vulnerability in the bootstrap loading of Cisco IOS XE Software could allow an authenticated, local attacker to write arbitrary files to an affected system. This vulnerability is due to insufficient input validation of the bootstrap file that is read by the system software when a device is first deployed in SD-WAN mode or when an administrator configures SD-Routing on the device. An attacker could exploit this vulnerability by modifying a bootstrap file generated by Cisco Catalyst SD-WAN Manager, loading it into the device flash, and then either reloading the device in a green field deployment in SD-WAN mode or configuring the device with SD-Routing. A successful exploit could allow the attacker to perform arbitrary file writes to the underlying operating system.

Reserved 2024-10-10 | Published 2025-05-07 | Updated 2025-05-08 | Assigner cisco


MEDIUM: 6.0CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Validation of Specified Type of Input

Product status

17.9.4
affected

17.9.5
affected

17.9.4a
affected

17.9.5a
affected

17.9.5b
affected

17.9.6
affected

17.9.6a
affected

17.9.5e
affected

17.9.5f
affected

17.12.1
affected

17.12.1w
affected

17.12.1a
affected

17.12.1x
affected

17.12.2
affected

17.12.3
affected

17.12.2a
affected

17.12.1y
affected

17.12.1z
affected

17.12.4
affected

17.12.3a
affected

17.12.1z1
affected

17.12.4a
affected

17.12.4b
affected

17.13.1
affected

17.13.1a
affected

17.14.1
affected

17.14.1a
affected

17.11.99SW
affected

References

sec.cloudapps.cisco.com/...isory/cisco-sa-bootstrap-KfgxYgdh (cisco-sa-bootstrap-KfgxYgdh)

cve.org (CVE-2025-20155)

nvd.nist.gov (CVE-2025-20155)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-20155

Support options

Helpdesk Chat, Email, Knowledgebase