Description
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to upload arbitrary files to an affected device.
This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by uploading arbitrary files to an affected device. A successful exploit could allow the attacker to store malicious files on the system and execute arbitrary commands on the operating system. The Security Impact Rating (SIR) of this advisory has been raised to High because an attacker could elevate privileges to root. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Report Designer.
Reserved 2024-10-10 | Published 2025-07-16 | Updated 2025-07-17 | Assigner
ciscoMEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Default status
unknown
10.6(1)
affected
10.5(1)SU1
affected
10.6(1)SU3
affected
12.0(1)
affected
10.6(1)SU1
affected
11.0(1)SU1
affected
11.5(1)SU1
affected
10.5(1)
affected
11.6(1)
affected
11.6(2)
affected
12.5(1)
affected
12.5(1)SU1
affected
12.5(1)SU2
affected
12.5(1)SU3
affected
12.5(1)_SU03_ES01
affected
12.5(1)_SU03_ES02
affected
12.5(1)_SU02_ES03
affected
12.5(1)_SU02_ES04
affected
12.5(1)_SU02_ES02
affected
12.5(1)_SU01_ES02
affected
12.5(1)_SU01_ES03
affected
12.5(1)_SU02_ES01
affected
11.6(2)ES07
affected
11.6(2)ES08
affected
12.5(1)_SU01_ES01
affected
12.0(1)ES04
affected
12.5(1)ES02
affected
12.5(1)ES03
affected
11.6(2)ES06
affected
12.5(1)ES01
affected
12.0(1)ES03
affected
12.0(1)ES01
affected
11.6(2)ES05
affected
12.0(1)ES02
affected
11.6(2)ES04
affected
11.6(2)ES03
affected
11.6(2)ES02
affected
11.6(2)ES01
affected
10.6(1)SU3ES03
affected
11.0(1)SU1ES03
affected
10.6(1)SU3ES01
affected
10.5(1)SU1ES10
affected
11.5(1)SU1ES03
affected
11.6(1)ES02
affected
11.5(1)ES01
affected
10.6(1)SU2
affected
10.6(1)SU2ES04
affected
11.6(1)ES01
affected
10.6(1)SU3ES02
affected
11.5(1)SU1ES02
affected
11.5(1)SU1ES01
affected
11.0(1)SU1ES02
affected
12.5(1)_SU03_ES03
affected
12.5(1)_SU03_ES04
affected
12.5(1)_SU03_ES05
affected
12.5(1)_SU03_ES06
affected
Default status
unknown
11.6(1)
affected
10.5(1)
affected
11.0(1)
affected
11.5(1)
affected
12.0(1)
affected
12.5(1)
affected
11.0(2)
affected
12.6(1)
affected
12.5(1)SU
affected
12.6(1)_ET
affected
12.6(1)_ES05_ET
affected
11.0(3)
affected
12.6(2)
affected
12.6(2)_504_Issue_ET
affected
12.6.1_ExcelIssue_ET
affected
12.6(2)_Permalink_ET
affected
12.6.2_CSCwk19536_ET
affected
12.6.2_CSCwm96922_ET
affected
12.6.2_Amq_OOS_ET
affected
12.5(2)ET_CSCwi79933
affected
12.6(2)_ET
affected
12.6.2_CSCwn48501_ET
affected
References
sec.cloudapps.cisco.com/...isco-sa-cuis-file-upload-UhNEtStm (cisco-sa-cuis-file-upload-UhNEtStm)
cve.org (CVE-2025-20274)
nvd.nist.gov (CVE-2025-20274)
Download JSON