First published: Wed May 07 2025(Updated: )
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read files from the underlying operating system.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20193 has been classified as a high-severity vulnerability due to its potential impact on affected devices.
To fix CVE-2025-20193, ensure that you apply the latest security updates and patches provided by Cisco for your IOS XE Software.
CVE-2025-20193 affects devices running vulnerable versions of Cisco IOS XE Software with a web-based management interface.
An attacker can perform an injection attack against an affected device due to the insufficient input validation associated with CVE-2025-20193.
Yes, CVE-2025-20193 allows low-privileged remote attackers to exploit the vulnerability if they have authenticated access.