cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-20397,https://securityvulnerability.io/vulnerability/CVE-2024-20397,Unauthenticated Attacker Could Bypass NX-OS Image Signature Verification via Insecure Bootloader Settings,"A vulnerability exists in the bootloader of Cisco NX-OS Software that could potentially allow unauthenticated attackers with physical access, or authenticated local attackers with administrative privileges, to bypass the image signature verification process. This issue stems from insecure bootloader settings. By executing specific bootloader commands, an attacker may succeed in loading unverified software, which could compromise the integrity and security of the affected devices. Proper management of bootloader configurations is crucial to mitigate this risk.",Cisco,"Cisco Nx-os Software,Cisco Nx-os System Software In Aci Mode,Cisco Unified Computing System (managed)",5.2,MEDIUM,0.0004299999854993075,false,,true,false,true,2025-02-05T21:15:33.000Z,,false,false,,2024-12-04T17:15:00.000Z,0 CVE-2025-20169,https://securityvulnerability.io/vulnerability/CVE-2025-20169,DoS Vulnerability in Cisco IOS and IOS XE Software SNMP Subsystem,"A vulnerability exists in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software that allows an authenticated, remote attacker to trigger a Denial of Service condition. This issue arises from improper error handling when processing SNMP requests. An attacker can exploit this flaw by sending specifically crafted SNMP requests. If successful, this can result in the affected device unexpectedly reloading, leading to service interruption. This vulnerability impacts SNMP versions 1, 2c, and 3, necessitating proper authentication or access to community strings for successful exploitation. For SNMP v2c or earlier, the attacker must possess valid SNMP community strings, while SNMP v3 exploits require valid user credentials.",Cisco,"iOS,Cisco iOS Xe Software",7.7,HIGH,0.0004400000034365803,false,,false,false,true,2025-02-05T16:40:24.267Z,false,false,false,,2025-02-05T16:40:24.267Z,10 CVE-2025-20175,https://securityvulnerability.io/vulnerability/CVE-2025-20175,Remote DoS Vulnerability in Cisco IOS and IOS XE Software,"A vulnerability exists in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software that may allow an authenticated remote attacker to induce a Denial of Service condition on the device. The issue arises from improper error handling during the parsing of SNMP requests. By sending specially crafted SNMP requests, an attacker can cause the affected device to reload unexpectedly, leading to service interruptions. Exploitation requires knowledge of SNMP community strings for SNMP versions 1, 2c, or valid user credentials for SNMP version 3.",Cisco,"iOS,Cisco iOS Xe Software",7.7,HIGH,0.0004400000034365803,false,,false,false,true,2025-02-05T16:39:51.163Z,false,false,false,,2025-02-05T16:39:51.163Z,0 CVE-2025-20174,https://securityvulnerability.io/vulnerability/CVE-2025-20174,Denial of Service Vulnerability in Cisco IOS Software and Cisco IOS XE Software,"A vulnerability exists within the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software that can be exploited by an authenticated, remote attacker. The root cause of this issue is improper error handling during the parsing of SNMP requests. An attacker capable of sending a specially crafted SNMP request to the targeted device may cause it to reload unexpectedly, leading to a Denial of Service condition. This vulnerability affects all versions of SNMP including v1, v2c, and v3. For exploitation via SNMP v2c or earlier, knowledge of a valid read-write or read-only SNMP community string is required, while exploitation through SNMP v3 necessitates valid user credentials.",Cisco,"iOS,Cisco iOS Xe Software",7.7,HIGH,0.0004400000034365803,false,,false,false,true,2025-02-05T16:39:33.753Z,false,false,false,,2025-02-05T16:39:33.753Z,0 CVE-2025-20170,https://securityvulnerability.io/vulnerability/CVE-2025-20170,DoS Vulnerability in Cisco IOS Software and Cisco IOS XE Software SNMP Subsystem,"A flaw in the SNMP subsystem of Cisco IOS and IOS XE Software can allow an authenticated remote attacker to trigger a Denial of Service condition. This occurs due to improper error handling during the parsing of SNMP requests. An attacker capable of sending a specially crafted SNMP request to an affected device may induce an unexpected reload of the system, rendering it inoperative. Exploitation via SNMP v2c or earlier requires knowledge of a valid SNMP community string, while exploitation through SNMP v3 necessitates valid SNMP user credentials.",Cisco,"iOS,Cisco iOS Xe Software",7.7,HIGH,0.0004400000034365803,false,,false,false,true,2025-02-05T16:39:11.660Z,false,false,false,,2025-02-05T16:39:11.660Z,0 CVE-2025-20171,https://securityvulnerability.io/vulnerability/CVE-2025-20171,Denial of Service Vulnerability in Cisco IOS Software and Cisco IOS XE Software,"A vulnerability exists in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software, which allows an authenticated, remote attacker to induce a Denial of Service (DoS) condition on the affected device. This issue arises from improper error handling during SNMP request parsing. An attacker could exploit this behavior by sending a specially crafted SNMP request to the affected device. If successfully exploited, this could trigger an unexpected device reload, leading to service disruption. The vulnerability affects SNMP versions 1, 2c, and 3. To exploit SNMP v2c or earlier, the attacker must possess valid read-write or read-only SNMP community strings for the system. For SNMP v3 exploitation, valid user credentials are required.",Cisco,"iOS,Cisco iOS Xe Software",7.7,HIGH,0.0004400000034365803,false,,false,false,true,2025-02-05T16:38:46.229Z,false,false,false,,2025-02-05T16:38:46.229Z,0 CVE-2025-20176,https://securityvulnerability.io/vulnerability/CVE-2025-20176,SNMP DoS Vulnerability in Cisco IOS and IOS XE Software,"A vulnerability exists in the SNMP subsystem of Cisco IOS and Cisco IOS XE Software that could permit a remote, authenticated attacker to initiate a denial of service (DoS) on the affected device. This issue arises from improper error handling during the parsing of SNMP requests. An attacker can exploit this vulnerability by sending a specially crafted SNMP request, resulting in an unexpected device reload and subsequent DoS. This vulnerability affects SNMP versions 1, 2c, and 3, with varying requirements for exploitation depending on the SNMP version being used.",Cisco,"iOS,Cisco iOS Xe Software",7.7,HIGH,0.0004400000034365803,false,,false,false,true,2025-02-05T16:38:19.071Z,false,false,false,,2025-02-05T16:38:19.071Z,0 CVE-2025-20172,https://securityvulnerability.io/vulnerability/CVE-2025-20172,"SNMP Vulnerability in Cisco IOS, IOS XE, and IOS XR Software","This vulnerability exists within the SNMP subsystem across multiple Cisco software platforms, namely Cisco IOS, IOS XE, and IOS XR. It arises from improper error handling during the parsing of SNMP requests, enabling an authenticated, remote attacker to potentially exploit the flaw. By sending a specially crafted SNMP request, attackers can either cause devices running IOS or IOS XE to unexpectedly reload, leading to downtime, or disrupt the SNMP process on devices running IOS XR, thereby interrupting SNMP responses. Exploitation requires knowledge of the valid SNMP community string for SNMP v2c or earlier versions, or valid SNMP user credentials for SNMP v3.",Cisco,"iOS,Cisco iOS Xr Software,Cisco iOS Xe Software",7.7,HIGH,0.0004400000034365803,false,,false,false,true,2025-02-05T16:37:29.828Z,false,false,false,,2025-02-05T16:37:29.828Z,0 CVE-2025-20173,https://securityvulnerability.io/vulnerability/CVE-2025-20173,DoS Vulnerability in Cisco IOS Software's SNMP Subsystem,"A vulnerability in the SNMP subsystem of Cisco IOS and IOS XE Software may allow an authenticated remote attacker to trigger a denial of service condition. This issue arises from improper error management when processing SNMP requests. An attacker can exploit this flaw by dispatching a specially crafted SNMP request to a vulnerable device, which can lead to an unexpected device reload and subsequent service interruption. Affected SNMP protocols include versions 1, 2c, and 3. For SNMP v2c or earlier exploitation, knowledge of a valid community string is required. For SNMP v3, valid user credentials are necessary for access.",Cisco,"iOS,Cisco iOS Xe Software",7.7,HIGH,0.0004400000034365803,false,,false,false,true,2025-02-05T16:35:23.109Z,false,false,false,,2025-02-05T16:35:23.109Z,0 CVE-2025-20207,https://securityvulnerability.io/vulnerability/CVE-2025-20207,Information Disclosure Vulnerability in Cisco Secure Email and Web Appliances,"A vulnerability in the Simple Network Management Protocol (SNMP) polling mechanism for certain Cisco appliances allows authenticated remote attackers to retrieve sensitive information regarding the underlying operating system. This issue arises because the appliances fail to adequately secure sensitive data when responding to SNMP polls. By crafting specific SNMP requests, an attacker with the appropriate SNMP credentials may exploit this flaw to gain unauthorized access to confidential information that should remain protected. Prompt mitigation is recommended to prevent potential data breaches.",Cisco,"Cisco Secure Email,Cisco Secure Email And Web Manager,Cisco Secure Web Appliance",4.3,MEDIUM,0.00044999999227002263,false,,false,false,true,2025-02-05T16:15:06.012Z,false,false,false,,2025-02-05T16:15:06.012Z,0 CVE-2025-20205,https://securityvulnerability.io/vulnerability/CVE-2025-20205,Cross-Site Scripting Vulnerability in Cisco Identity Services Engine Management Interface,"A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) allows authenticated remote attackers to conduct cross-site scripting (XSS) attacks. This issue arises from inadequate validation of user-supplied input, enabling attackers to inject malicious scripts into the management interface's pages. Successful exploitation can lead to the execution of arbitrary script code in the context of the user's session or the capture of sensitive information accessed by the browser. This vulnerability requires an attacker to possess valid administrative credentials to execute an attack.",Cisco,Cisco Identity Services Engine Software,4.8,MEDIUM,0.00044999999227002263,false,,false,false,true,2025-02-05T16:14:56.959Z,false,false,false,,2025-02-05T16:14:56.959Z,0 CVE-2025-20204,https://securityvulnerability.io/vulnerability/CVE-2025-20204,Cross-Site Scripting Vulnerability in Cisco Identity Services Engine,"A vulnerability exists in the web-based management interface of Cisco Identity Services Engine (ISE) allowing authenticated attackers to inject malicious code. This flaw arises from improper validation of user input, enabling attackers to execute arbitrary scripts within the interface and potentially access sensitive information stored in the user's browser session. Successful exploitation requires valid administrative credentials, making it crucial for users to assess and secure their configurations.",Cisco,Cisco Identity Services Engine Software,4.8,MEDIUM,0.00044999999227002263,false,,false,false,true,2025-02-05T16:14:47.330Z,false,false,false,,2025-02-05T16:14:47.330Z,0 CVE-2025-20185,https://securityvulnerability.io/vulnerability/CVE-2025-20185,Privilege Escalation Flaw in Cisco AsyncOS for Secure Email and Web Solutions,"A vulnerability exists in the remote access functionality of Cisco AsyncOS Software used in Cisco Secure Email and Web appliances, allowing an authenticated local attacker to gain root privileges. This flaw arises from an architectural weakness in the password generation algorithm specific to remote access. By exploiting this vulnerability, an attacker with valid administrative credentials can generate a temporary service account password, leading to the ability to execute arbitrary commands as the root user and access the underlying operating system, posing significant security risks to affected systems.",Cisco,"Cisco Secure Email,Cisco Secure Email And Web Manager,Cisco Secure Web Appliance",3.4,LOW,0.0004299999854993075,false,,false,false,true,2025-02-05T16:14:38.541Z,false,false,false,,2025-02-05T16:14:38.541Z,0 CVE-2025-20184,https://securityvulnerability.io/vulnerability/CVE-2025-20184,Command Injection Vulnerability in Cisco Secure Email Gateway and Web Appliance,"A vulnerability exists in the web management interface of Cisco AsyncOS Software, impacting Cisco Secure Email Gateway and Cisco Secure Web Appliance. This weakness arises from inadequate validation of XML configuration files, permitting an authenticated, remote attacker with valid administrative credentials to perform command injection attacks. By uploading a specially crafted XML configuration file, the attacker can exploit this vulnerability to execute arbitrary commands on the host operating system with root privileges, potentially compromising the entire system.",Cisco,"Cisco Secure Email,Cisco Secure Web Appliance",6.5,MEDIUM,0.0006600000197067857,false,,false,false,true,2025-02-05T16:14:30.863Z,false,false,false,,2025-02-05T16:14:30.863Z,0 CVE-2025-20183,https://securityvulnerability.io/vulnerability/CVE-2025-20183,Policy-Based Vulnerability in Cisco AsyncOS Software for Secure Web Appliance,"A policy-based vulnerability exists in the Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for the Cisco Secure Web Appliance. This flaw is caused by improper handling of crafted range request headers, which can be exploited by unauthenticated remote attackers. By sending a specially crafted HTTP request through the affected device, attackers have the potential to bypass the antivirus scanner, thereby enabling the download of malicious files onto endpoint systems without detection. This presents significant security risks for users relying on Cisco Secure Web Appliance for malware protection.",Cisco,Cisco Secure Web Appliance,5.8,MEDIUM,0.0004600000102072954,false,,false,false,true,2025-02-05T16:14:21.787Z,false,false,false,,2025-02-05T16:14:21.787Z,0 CVE-2025-20180,https://securityvulnerability.io/vulnerability/CVE-2025-20180,Stored XSS Vulnerability in Cisco AsyncOS Software for Email and Web Management,"A stored cross-site scripting vulnerability exists in the web-based management interface of Cisco AsyncOS Software for the Cisco Secure Email and Web Manager and Secure Email Gateway. This vulnerability arises from inadequate validation of user input, allowing an authenticated remote attacker to craft a malicious link that, when clicked by a user, could execute arbitrary script code in the browser context of the affected interface. Successful exploitation enables the attacker to access sensitive information from the user's session. To launch this attack, the assailant must possess valid credentials for a user account with at least Operator privileges.",Cisco,"Cisco Secure Email,Cisco Secure Email And Web Manager",4.8,MEDIUM,0.00044999999227002263,false,,false,false,true,2025-02-05T16:14:11.746Z,false,false,false,,2025-02-05T16:14:11.746Z,0 CVE-2025-20179,https://securityvulnerability.io/vulnerability/CVE-2025-20179,Cross-Site Scripting Vulnerability in Cisco Expressway Series Web Interface,"A vulnerability exists in the web-based management interface of the Cisco Expressway Series, allowing an unauthenticated attacker to conduct cross-site scripting (XSS) attacks. This security issue arises from improper validation of user input, enabling malicious actors to execute arbitrary scripts in the context of the interface or access sensitive information within the user's browser. To mitigate the risk, administrators should ensure that users are educated about the importance of not clicking on untrusted links and should apply security patches as they become available.",Cisco,Cisco Telepresence Video Communication Server (vcs) Expressway,6.1,MEDIUM,0.0004600000102072954,false,,false,false,true,2025-02-05T16:14:03.704Z,false,false,false,,2025-02-05T16:14:03.704Z,0 CVE-2025-20125,https://securityvulnerability.io/vulnerability/CVE-2025-20125,API Vulnerability in Cisco Identity Services Engine,"A vulnerability exists in the API of Cisco Identity Services Engine that allows authenticated remote attackers with valid read-only credentials to exploit system weaknesses. By sending a specially crafted HTTP request, attackers can potentially access sensitive information, alter system configurations, and restart the affected node. This issue arises from insufficient authorization and poor validation of user-provided data in the API. Exploitation can lead to significant security risks, particularly in single-node deployments, where new devices may fail to authenticate during restart periods.",Cisco,"Cisco Identity Services Engine Software,Cisco Ise Passive Identity Connector",9.1,CRITICAL,0.0004400000034365803,false,,false,false,true,2025-02-05T16:12:17.272Z,false,false,false,,2025-02-05T16:12:17.272Z,0 CVE-2025-20124,https://securityvulnerability.io/vulnerability/CVE-2025-20124,Insecure Deserialization Vulnerability in Cisco ISE API,"A security flaw in the API of Cisco Identity Services Engine (ISE) allows authenticated remote attackers to exploit insecure deserialization of user-supplied Java byte streams. By sending a specially crafted serialized Java object to the vulnerable API, an attacker can potentially execute arbitrary commands with root privileges on the affected device. This vulnerability necessitates valid read-only administrative credentials to exploit and affects device authentication during system reloads, posing a risk in single-node deployments.",Cisco,"Cisco Identity Services Engine Software,Cisco Ise Passive Identity Connector",9.9,CRITICAL,0.0004600000102072954,false,,true,false,true,2025-02-05T16:12:07.999Z,false,true,false,,2025-02-05T16:12:07.999Z,2434 CVE-2022-20685,https://securityvulnerability.io/vulnerability/CVE-2022-20685,Cisco Snort Detection Engine Vulnerability Could Lead to DoS Conditions,"A vulnerability exists within the Modbus preprocessor of the Snort detection engine which could enable an unauthenticated remote attacker to exploit the device, resulting in a denial of service condition. The root cause lies in an integer overflow that occurs when the system processes Modbus traffic. By sending specially crafted Modbus messages, an attacker can induce the Snort process to become unresponsive, leading to a halt in traffic inspection. Cisco has issued software updates addressing this vulnerability, with no applicable workarounds available.",Cisco,"Cisco Cyber Vision,Cisco Firepower Threat Defense Software,Cisco Utd Snort Ips Engine Software",7.5,HIGH,0.0004299999854993075,false,,false,false,true,2025-01-27T18:15:04.000Z,,false,false,,2024-11-15T15:36:31.261Z,0 CVE-2025-20165,https://securityvulnerability.io/vulnerability/CVE-2025-20165,Denial of Service vulnerability in Cisco BroadWorks SIP processing,"A vulnerability exists in the SIP processing subsystem of Cisco BroadWorks that allows unauthenticated, remote attackers to disrupt service by overwhelming the system with SIP requests. This issue stems from improper memory management for specific SIP requests. When an attacker floods the affected system with a high volume of SIP requests, they can deplete the memory available to the Cisco BroadWorks Network Servers, causing them to be unable to process any additional requests. This results in a denial of service condition, necessitating manual intervention to restore functionality.",Cisco,Cisco Broadworks,7.5,HIGH,0.0005099999834783375,false,,false,false,true,2025-01-22T16:21:30.377Z,false,false,false,,2025-01-22T16:21:30.377Z,0 CVE-2025-20156,https://securityvulnerability.io/vulnerability/CVE-2025-20156,Remote Privilege Escalation Vulnerability in Cisco Meeting Management,"A vulnerability in the REST API of Cisco Meeting Management enables a remote, authenticated attacker with minimal privileges to elevate their status to that of an administrator on affected devices. This issue arises from inadequate authorization checks for REST API users, allowing attackers to exploit this gap by sending crafted API requests to a specific endpoint. Successful exploitation could grant attackers unauthorized administrator-level access to edge nodes managed by Cisco Meeting Management, posing a significant risk to system integrity and data security.",Cisco,Cisco Meeting Management,9.9,CRITICAL,0.00044999999227002263,false,,true,false,true,2025-01-22T16:21:20.333Z,false,false,false,,2025-01-22T16:21:20.333Z,1522 CVE-2025-20128,https://securityvulnerability.io/vulnerability/CVE-2025-20128,Denial of Service Vulnerability in ClamAV OLE2 Processing,"A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV can be exploited by an unauthenticated remote attacker to cause a denial of service (DoS) condition. This issue arises from an integer underflow in a bounds check, allowing for a heap buffer overflow read. An attacker can execute this by submitting a specially crafted file containing OLE2 content to the ClamAV scanner on an affected device. A successful attack may terminate the ClamAV scanning process, resulting in a denial of service. Cisco has issued software updates that mitigate this vulnerability, and no workarounds exist.",Cisco,Cisco Secure Endpoint,5.3,MEDIUM,0.0004600000102072954,false,,true,false,true,2025-01-22T16:21:12.329Z,false,false,false,,2025-01-22T16:21:12.329Z,40 CVE-2024-20308,https://securityvulnerability.io/vulnerability/CVE-2024-20308,Cisco IOS and IOS XE Vulnerability: Heap Underflow Due to IKEv1 Fragmentation Code Flaw,"A security flaw has been identified in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software that allows an unauthenticated, remote attacker to exploit the affected device. The vulnerability arises from a failure to properly reassemble crafted, fragmented IKEv1 packets, which could lead to a heap underflow condition. An attacker can exploit this issue by sending specifically crafted UDP packets to the affected system. Successful exploitation may cause the device to reload, thus resulting in a denial of service (DoS) condition. The vulnerability is applicable to both IPv4 and IPv6 traffic, which means that only traffic directed at the affected system is capable of triggering the flaw.",Cisco,"iOS,Cisco iOS Xe Software",8.6,HIGH,0.0004299999854993075,false,,false,false,true,2024-11-26T16:15:10.000Z,,false,false,,2024-03-27T17:22:11.592Z,0 CVE-2024-20536,https://securityvulnerability.io/vulnerability/CVE-2024-20536,Cisco Nexus Dashboard Fabric Controller Vulnerability Could Allow Arbitrary SQL Commands,"A vulnerability exists in the REST API endpoint and the web-based management interface of the Cisco Nexus Dashboard Fabric Controller (NDFC), which could permit authenticated remote attackers with read-only privileges to execute arbitrary SQL commands. This flaw is caused by inadequate validation of user-supplied input, enabling an attacker to exploit this vulnerability by dispatching a specially crafted request to a targeted REST API endpoint or management interface. Successfully exploiting this vulnerability could allow unauthorized access to read, modify, or delete data within the system's internal database, posing significant risks to data integrity and availability.",Cisco,Cisco Data Center Network Manager,8.8,HIGH,0.0004299999854993075,false,,false,false,true,2024-11-09T05:15:04.000Z,,false,false,,2024-11-06T17:15:00.000Z,0