We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20178

Cisco Secure Network Analytics Privilege Escalation Vulnerability



Description

A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root.

Reserved 2024-10-10 | Published 2025-04-16 | Updated 2025-04-17 | Assigner cisco


MEDIUM: 6.0CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Verification of Cryptographic Signature

Product status

Default status
unknown

7.5.0
affected

7.5.1
affected

7.5.2
affected

References

sec.cloudapps.cisco.com/...sory/cisco-sa-sna-prvesc-4BQmK33Z (cisco-sa-sna-prvesc-4BQmK33Z)

cve.org (CVE-2025-20178)

nvd.nist.gov (CVE-2025-20178)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-20178

Support options

Helpdesk Chat, Email, Knowledgebase