First published: Wed Feb 05 2025(Updated: )
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS software | ||
Cisco AsyncOS for Secure Email Gateway | ||
Cisco Secure Web Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20184 has been classified as a high severity vulnerability due to its potential for remote command injection.
To mitigate CVE-2025-20184, ensure your Cisco AsyncOS Software, Cisco Secure Email Gateway, or Cisco Secure Web Appliance is updated to the latest patch released by Cisco.
CVE-2025-20184 affects authenticated users of the web-based management interface on Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance.
CVE-2025-20184 allows authenticated remote attackers to execute command injection attacks on the affected devices.
As of now, there are no publicly known exploits for CVE-2025-20184, but the vulnerability poses a significant risk if left unpatched.