First published: Wed Apr 16 2025(Updated: )
A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Network Analytics |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-20178 has been assigned a high severity rating due to its potential for remote command execution with administrative credentials.
To fix CVE-2025-20178, apply the latest security patches provided by Cisco for the Secure Network Analytics product.
CVE-2025-20178 affects users of Cisco Secure Network Analytics who are using versions vulnerable to this command execution flaw.
CVE-2025-20178 can be exploited by an authenticated remote attacker to execute arbitrary commands as root on the underlying operating system.
Exploitation of CVE-2025-20178 requires valid administrative credentials, which can make it more complex but still poses a significant risk.