Home

Description

A vulnerability in the logging feature of Cisco NX-OS Software for Cisco Nexus 3000 Series Switches, Cisco Nexus 9000 Series Switches in standalone NX-OS mode, Cisco UCS 6400 Fabric Interconnects, Cisco UCS 6500 Series Fabric Interconnects, and Cisco UCS 9108 100G Fabric Interconnects could allow an authenticated, local attacker access to sensitive information. This vulnerability is due to improper logging of sensitive information. An attacker could exploit this vulnerability by accessing log files on the file system where they are stored. A successful exploit could allow the attacker to access sensitive information, such as stored credentials.

PUBLISHED Reserved 2024-10-10 | Published 2025-08-27 | Updated 2025-08-27 | Assigner cisco




MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unknown

9.2(3)
affected

7.0(3)I5(2)
affected

7.0(3)I4(5)
affected

7.0(3)I4(6)
affected

9.2(2v)
affected

7.0(3)I4(7)
affected

7.0(3)I4(8)
affected

9.2(1)
affected

9.2(2t)
affected

9.2(3y)
affected

7.0(3)I7(6z)
affected

9.3(2)
affected

7.0(3)F3(3)
affected

7.0(3)I7(3z)
affected

7.0(3)IM7(2)
affected

7.0(3)I7(5a)
affected

7.0(3)I6(1)
affected

7.0(3)I5(3b)
affected

9.2(4)
affected

7.0(3)F3(3c)
affected

7.0(3)F3(1)
affected

7.0(3)F3(5)
affected

7.0(3)I7(2)
affected

7.0(3)I5(3)
affected

7.0(3)I7(3)
affected

7.0(3)I6(2)
affected

9.3(1)
affected

7.0(3)I7(6)
affected

7.0(3)I4(8z)
affected

7.0(3)I4(9)
affected

7.0(3)I7(4)
affected

7.0(3)I7(7)
affected

7.0(3)I5(1)
affected

9.3(1z)
affected

9.2(2)
affected

7.0(3)F3(4)
affected

7.0(3)I4(8b)
affected

7.0(3)I4(6t)
affected

7.0(3)I5(3a)
affected

7.0(3)I7(5)
affected

7.0(3)F3(3a)
affected

7.0(3)I4(8a)
affected

7.0(3)F3(2)
affected

7.0(3)I4(4)
affected

7.0(3)I7(1)
affected

7.0(3)IA7(2)
affected

7.0(3)IA7(1)
affected

9.3(3)
affected

7.0(3)I7(8)
affected

9.3(4)
affected

9.3(5)
affected

7.0(3)I7(9)
affected

9.3(6)
affected

10.1(2)
affected

10.1(1)
affected

9.3(5w)
affected

9.3(7)
affected

9.3(7k)
affected

7.0(3)I7(9w)
affected

10.2(1)
affected

9.3(7a)
affected

9.3(8)
affected

7.0(3)I7(10)
affected

10.2(1q)
affected

10.2(2)
affected

9.3(9)
affected

10.1(2t)
affected

10.2(3)
affected

10.2(3t)
affected

9.3(10)
affected

10.2(2a)
affected

10.3(1)
affected

10.2(4)
affected

10.3(2)
affected

9.3(11)
affected

10.3(3)
affected

10.2(5)
affected

9.3(12)
affected

10.2(3v)
affected

10.4(1)
affected

10.3(99w)
affected

10.2(6)
affected

10.3(3w)
affected

10.3(99x)
affected

10.3(3o)
affected

10.3(4)
affected

10.3(3p)
affected

10.3(4a)
affected

10.4(2)
affected

10.3(3q)
affected

9.3(13)
affected

10.3(5)
affected

10.2(7)
affected

10.4(3)
affected

10.3(3x)
affected

10.3(4g)
affected

10.5(1)
affected

10.2(8)
affected

10.3(3r)
affected

10.3(6)
affected

9.3(14)
affected

10.4(4)
affected

10.3(4h)
affected

10.5(2)
affected

10.3(7)
affected

10.4(5)
affected

10.5(3)
affected

10.2(9)
affected

9.3(15)
affected

10.4(4g)
affected

10.5(3t)
affected

10.5(3e)
affected

10.5(3o)
affected

Default status
unknown

4.0(4c)
affected

4.0(2b)
affected

4.1(2a)
affected

4.0(1a)
affected

4.0(2a)
affected

4.0(1b)
affected

4.1(1c)
affected

4.0(4a)
affected

4.0(4b)
affected

4.0(2e)
affected

4.1(1a)
affected

4.0(4d)
affected

4.0(4h)
affected

4.0(4g)
affected

4.0(1d)
affected

4.1(1e)
affected

4.0(4f)
affected

4.0(4e)
affected

4.0(4i)
affected

4.1(1d)
affected

4.0(2d)
affected

4.1(1b)
affected

4.0(1c)
affected

4.1(2b)
affected

4.0(4k)
affected

4.1(3a)
affected

4.1(3b)
affected

4.1(2c)
affected

4.0(4l)
affected

4.1(4a)
affected

4.1(3c)
affected

4.1(3d)
affected

4.2(1c)
affected

4.2(1d)
affected

4.0(4m)
affected

4.1(3e)
affected

4.2(1f)
affected

4.1(3f)
affected

4.2(1i)
affected

4.1(3h)
affected

4.2(1k)
affected

4.2(1l)
affected

4.0(4n)
affected

4.2(1m)
affected

4.1(3i)
affected

4.2(2a)
affected

4.2(1n)
affected

4.1(3j)
affected

4.2(2c)
affected

4.2(2d)
affected

4.2(3b)
affected

4.1(3k)
affected

4.0(4o)
affected

4.2(2e)
affected

4.2(3d)
affected

4.2(3e)
affected

4.2(3g)
affected

4.1(3l)
affected

4.3(2b)
affected

4.2(3h)
affected

4.2(3i)
affected

4.3(2c)
affected

4.1(3m)
affected

4.3(2e)
affected

4.3(3a)
affected

4.2(3j)
affected

4.3(3c)
affected

4.3(4a)
affected

4.2(3k)
affected

4.3(4b)
affected

4.3(4c)
affected

4.2(3l)
affected

4.3(4d)
affected

4.3(2f)
affected

4.2(3m)
affected

4.3(5a)
affected

4.3(4e)
affected

4.1(3n)
affected

4.3(4f)
affected

4.2(3n)
affected

4.3(5c)
affected

4.2(3o)
affected

4.3(5d)
affected

4.3(6a)
affected

4.3(6b)
affected

4.3(5e)
affected

References

sec.cloudapps.cisco.com/...ry/cisco-sa-nxos-infodis-TEcTYSFG (cisco-sa-nxos-infodis-TEcTYSFG)

cve.org (CVE-2025-20290)

nvd.nist.gov (CVE-2025-20290)

Download JSON