cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-20165,https://securityvulnerability.io/vulnerability/CVE-2025-20165,Denial of Service vulnerability in Cisco BroadWorks SIP processing,"A vulnerability exists in the SIP processing subsystem of Cisco BroadWorks that allows unauthenticated, remote attackers to disrupt service by overwhelming the system with SIP requests. This issue stems from improper memory management for specific SIP requests. When an attacker floods the affected system with a high volume of SIP requests, they can deplete the memory available to the Cisco BroadWorks Network Servers, causing them to be unable to process any additional requests. This results in a denial of service condition, necessitating manual intervention to restore functionality.",Cisco,Cisco Broadworks,7.5,HIGH,0.0005099999834783375,false,,false,false,true,2025-01-22T16:21:30.377Z,false,false,false,,2025-01-22T16:21:30.377Z,0 CVE-2025-20156,https://securityvulnerability.io/vulnerability/CVE-2025-20156,Remote Privilege Escalation Vulnerability in Cisco Meeting Management,"A vulnerability in the REST API of Cisco Meeting Management enables a remote, authenticated attacker with minimal privileges to elevate their status to that of an administrator on affected devices. This issue arises from inadequate authorization checks for REST API users, allowing attackers to exploit this gap by sending crafted API requests to a specific endpoint. Successful exploitation could grant attackers unauthorized administrator-level access to edge nodes managed by Cisco Meeting Management, posing a significant risk to system integrity and data security.",Cisco,Cisco Meeting Management,9.9,CRITICAL,0.00044999999227002263,false,,true,false,true,2025-01-22T16:21:20.333Z,false,false,false,,2025-01-22T16:21:20.333Z,1522 CVE-2020-26071,https://securityvulnerability.io/vulnerability/CVE-2020-26071,Cisco SD-WAN Software Vulnerability Discovered,"A vulnerability has been identified in the Command Line Interface (CLI) of Cisco SD-WAN Software, allowing an authenticated local attacker to create or overwrite arbitrary files on the device. This situation arises from inadequate input validation for certain commands within the software. By injecting crafted arguments into these commands, an attacker could potentially disrupt the normal operation of the device, resulting in a denial of service condition. Cisco has addressed this issue in subsequent software updates, and there are no known workarounds to mitigate the risk. Users are advised to apply the latest updates to protect their systems.",Cisco,"Cisco Catalyst Sd-wan Manager,Cisco Sd-wan Vcontainer,Cisco Sd-wan Vedge Cloud,Cisco Sd-wan Vedge Router",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-11-18T16:05:35.221Z,0 CVE-2020-27124,https://securityvulnerability.io/vulnerability/CVE-2020-27124,Cisco ASA Software Vulnerability Could Lead to Unauthorized Reload and Denial of Service,"A flaw exists in the SSL/TLS handler of Cisco Adaptive Security Appliance (ASA) Software that enables an unauthenticated remote attacker to disrupt normal operations by causing the affected device to unexpectedly reload. This situation arises from improper error handling during established SSL/TLS connections. An attacker can exploit this by initiating an SSL/TLS connection and transmitting a specially crafted malicious message, resulting in a potential denial of service (DoS) condition. Cisco has issued software updates to mitigate this risk; however, no workarounds are available.",Cisco,Cisco Adaptive Security Appliance (asa) Software,8.6,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2024-11-18T16:03:00.333Z,0 CVE-2020-26073,https://securityvulnerability.io/vulnerability/CVE-2020-26073,Unauthorized Access to Sensitive Information via Directory Traversal,"The application data endpoints of Cisco SD-WAN vManage Software are vulnerable due to improper validation of directory traversal character sequences. This vulnerability enables an unauthenticated, remote attacker to exploit application programming interfaces (APIs) by sending malicious requests. Successful exploitation could lead to directory traversal attacks, granting access to sensitive information such as credentials or user tokens. Cisco has issued software updates that mitigate this vulnerability, and there are no effective workarounds available.",Cisco,Cisco Catalyst Sd-wan Manager,7.5,HIGH,0.0074800001457333565,false,,false,false,false,,,false,false,,2024-11-18T15:57:25.059Z,0 CVE-2020-26074,https://securityvulnerability.io/vulnerability/CVE-2020-26074,Cisco SD-WAN vManage Software Vulnerability - Escalated Privileges on Local Systems,"A local attacker with valid access can exploit a vulnerability in the system file transfer functions of Cisco SD-WAN vManage Software to achieve escalated privileges on the underlying operating system. This vulnerability arises from improper validation of path inputs for file transfer operations. An attacker may send specially crafted requests with malicious path variables to the system, potentially allowing them to overwrite arbitrary files. Such exploitation could enable the attacker to alter the system's behavior and gain higher privileges. Cisco has addressed this issue through software updates, and no workarounds are available to mitigate the vulnerability.",Cisco,Cisco Catalyst Sd-wan Manager,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-18T15:56:13.890Z,0 CVE-2021-1285,https://securityvulnerability.io/vulnerability/CVE-2021-1285,Cisco Snort Vulnerability Could Lead to Denial of Service Condition,"A vulnerability exists in the Ethernet Frame Decoder of the Cisco Snort Detection Engine that may permit an unauthenticated, adjacent attacker to create a denial of service condition. This vulnerability arises from inadequate management of error situations while processing Ethernet frames. By sending crafted malicious Ethernet frames to an affected device, an adversary can potentially deplete disk space on that device. This depletion can result in restrictions on administrator login access and might impede the device's boot process, necessitating manual recovery efforts. To recover from such an incident, affected users are encouraged to seek assistance from the Cisco Technical Assistance Center (TAC). Cisco has made software updates available to rectify this vulnerability, as no workarounds are effective.",Cisco,Cisco Utd Snort Ips Engine Software,7.4,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-18T15:41:50.263Z,0 CVE-2022-20649,https://securityvulnerability.io/vulnerability/CVE-2022-20649,Unauthenticated Remote Code Execution Vulnerability in Cisco RCM for StarOS,"The vulnerability in Cisco RCM for Cisco StarOS Software facilitates remote code execution due to debug mode being enabled for certain services. An attacker can exploit this weakness by connecting to the device and targeting the service with debug mode active. Once exploited, the attacker gains the ability to execute arbitrary commands with root privileges, potentially compromising the system's security. While unauthenticated attackers may perform detailed reconnaissance to gain access, authenticated users can also exploit this vulnerability. Cisco has implemented software updates that resolve this issue, and no workarounds are available.",Cisco,Cisco Redundancy Configuration Manager,8.1,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2024-11-15T15:59:07.107Z,0 CVE-2022-20655,https://securityvulnerability.io/vulnerability/CVE-2022-20655,Command Injection Vulnerability in ConfD Could Allow Authenticated Attacker to Execute Arbitrary Commands with Root Privileges,"An issue within the command line interface (CLI) implementation in Cisco's ConfD can allow authenticated, local attackers to conduct command injection attacks. This vulnerability stems from insufficient validation of process arguments, enabling an attacker to inject malicious commands during execution. Successfully exploiting this vulnerability can lead to the execution of arbitrary commands on the underlying operating system with the same privileges as ConfD, often equivalent to root access, thereby posing severe risks to system security and integrity.",Cisco,"Cisco iOS Xr Software,Cisco Virtual Topology System (vts),Cisco Network Services Orchestrator,Cisco Enterprise Nfv Infrastructure Software,Cisco Catalyst Sd-wan,Cisco Catalyst Sd-wan Manager,Cisco iOS Xe Catalyst Sd-wan,Cisco Sd-wan Vedge Router,Cisco Ultra Gateway Platform,Cisco Carrier Packet Transport",8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-15T15:56:42.927Z,0 CVE-2022-20685,https://securityvulnerability.io/vulnerability/CVE-2022-20685,Cisco Snort Detection Engine Vulnerability Could Lead to DoS Conditions,"A vulnerability exists within the Modbus preprocessor of the Snort detection engine which could enable an unauthenticated remote attacker to exploit the device, resulting in a denial of service condition. The root cause lies in an integer overflow that occurs when the system processes Modbus traffic. By sending specially crafted Modbus messages, an attacker can induce the Snort process to become unresponsive, leading to a halt in traffic inspection. Cisco has issued software updates addressing this vulnerability, with no applicable workarounds available.",Cisco,"Cisco Cyber Vision,Cisco Firepower Threat Defense Software,Cisco Utd Snort Ips Engine Software",7.5,HIGH,0.0004299999854993075,false,,false,false,true,2025-01-27T18:15:04.000Z,,false,false,,2024-11-15T15:36:31.261Z,0 CVE-2022-20814,https://securityvulnerability.io/vulnerability/CVE-2022-20814,Cisco Expressway-C and TelePresence VCS Vulnerability: Unauthorized Access to Sensitive Data possible via SSL Certificate Validation Flaw,"A vulnerability exists in the certificate validation process of Cisco Expressway-C and Cisco TelePresence VCS, which could be exploited by an unauthenticated remote attacker. This flaw arises from inadequate validation of the SSL server certificate during connections to Cisco Unified Communications Manager devices. An attacker may leverage a man-in-the-middle technique to intercept communication between devices, potentially impersonating the endpoint with a self-signed certificate. Successful exploitation may enable access to sensitive data or allow for the manipulation of transmitted information. Cisco has released updates addressing this vulnerability, with no available workarounds.",Cisco,Cisco Telepresence Video Communication Server (vcs) Expressway,7.4,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-11-15T15:32:47.058Z,0 CVE-2022-20853,https://securityvulnerability.io/vulnerability/CVE-2022-20853,Cisco Issues Security Advisory for Cross-Site Request Forgery Vulnerability,"This vulnerability affects the REST API of Cisco Expressway Series and Cisco TelePresence VCS, allowing unauthenticated, remote attackers to potentially execute cross-site request forgery (CSRF) attacks on affected systems. Insufficient CSRF protections in the web-based management interface enable an attacker to trick a user into clicking a specially crafted link. This could lead to unauthorized actions being performed on the affected system, including the possibility of causing it to reload. Cisco has issued software updates to mitigate this issue, with no available workarounds.",Cisco,Cisco Telepresence Video Communication Server (vcs) Expressway,7.4,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-11-15T15:27:23.911Z,0 CVE-2023-20036,https://securityvulnerability.io/vulnerability/CVE-2023-20036,Cisco IND Vulnerability Allows Arbitrary Commands Execution with Admin Privileges,"A vulnerability exists in the web UI of Cisco IND that enables an authenticated remote attacker to execute arbitrary commands with administrative privileges on the underlying operating system. This issue arises from inadequate input validation when a Device Pack is uploaded. An attacker can exploit this vulnerability by manipulating the request sent during the Device Pack upload process. If successfully exploited, the attacker could execute arbitrary commands as NT AUTHORITY\SYSTEM, compromising the integrity and security of the affected device. Software updates are available from Cisco to mitigate this vulnerability, as no workarounds can sufficiently address the issue.",Cisco,Cisco Industrial Network Director,9.9,CRITICAL,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-11-15T15:21:32.540Z,0 CVE-2023-20125,https://securityvulnerability.io/vulnerability/CVE-2023-20125,Unauthenticated Remote Attacker Could Exhaust System Resources and Cause Denial of Service,"A vulnerability in the local interface of Cisco BroadWorks Network Server enables unauthenticated, remote attackers to exploit system resources. This vulnerability arises due to inadequate rate limiting on certain incoming TCP connections. An attacker could send an overwhelming number of TCP connection requests, leading to resource exhaustion that renders the server inoperable. To restore service after an exploit, it is necessary to either restart the Cisco BroadWorks Network Server software or reboot the server node. Cisco has issued software updates to rectify this issue; however, there are no available workarounds.",Cisco,Cisco Broadworks,8.6,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-11-15T14:58:04.361Z,0 CVE-2023-20154,https://securityvulnerability.io/vulnerability/CVE-2023-20154,Cisco Modeling Labs External Authentication Vulnerability,"A vulnerability exists in the external authentication mechanism of Cisco Modeling Labs, allowing an unauthenticated, remote attacker to compromise the web interface with administrative privileges. This issue arises from the improper handling of messages by the external authentication server, enabling an attacker to bypass the login process under specific conditions. By exploiting this flaw, an attacker could gain full access to the web interface, including the ability to modify simulations and user-generated data. It is essential that organizations using affected versions of Cisco Modeling Labs apply the latest software updates and consider available workarounds to mitigate the risk associated with this vulnerability.",Cisco,Cisco Modeling Labs,9.1,CRITICAL,0.000910000002477318,false,,false,false,false,,,false,false,,2024-11-15T14:54:34.191Z,0 CVE-2024-20536,https://securityvulnerability.io/vulnerability/CVE-2024-20536,Cisco Nexus Dashboard Fabric Controller Vulnerability Could Allow Arbitrary SQL Commands,"A vulnerability exists in the REST API endpoint and the web-based management interface of the Cisco Nexus Dashboard Fabric Controller (NDFC), which could permit authenticated remote attackers with read-only privileges to execute arbitrary SQL commands. This flaw is caused by inadequate validation of user-supplied input, enabling an attacker to exploit this vulnerability by dispatching a specially crafted request to a targeted REST API endpoint or management interface. Successfully exploiting this vulnerability could allow unauthorized access to read, modify, or delete data within the system's internal database, posing significant risks to data integrity and availability.",Cisco,Cisco Data Center Network Manager,8.8,HIGH,0.0004299999854993075,false,,false,false,true,2024-11-09T05:15:04.000Z,,false,false,,2024-11-06T17:15:00.000Z,0 CVE-2024-20418,https://securityvulnerability.io/vulnerability/CVE-2024-20418,Command Injection Vulnerability in Cisco Unified Industrial Wireless Software Could Allow Remote Root Access,"A critical flaw has been identified in the web-based management interface of Cisco Unified Industrial Wireless Software, specifically impacting Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points. This vulnerability arises from inadequate input validation within the management interface, allowing an unauthenticated remote attacker to initiate command injection attacks. By sending specially crafted HTTP requests, an attacker could gain root privileges over the underlying operating system of the affected devices. This exposure significantly increases the risk of unauthorized access and manipulation of the device, potentially leading to widespread security breaches.",Cisco,Cisco Aironet Access Point Software (iOS Xe Controller),10,CRITICAL,0.0004299999854993075,false,,true,false,true,2024-11-07T06:03:55.000Z,,true,false,,2024-11-06T17:15:00.000Z,4678 CVE-2024-20408,https://securityvulnerability.io/vulnerability/CVE-2024-20408,Cisco ASA Software Vulnerability - Remote Reboot Attack Possible,"A vulnerability exists in the Dynamic Access Policies (DAP) feature of Cisco's Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software. This issue arises from improper validation of data in HTTPS POST requests, which can be exploited by an authenticated remote attacker possessing valid VPN user credentials. Upon successful exploitation, the attacker can send specially crafted HTTPS POST requests to the affected device, causing it to unexpectedly reload. This behavior results in a denial of service condition, potentially disrupting services for users relying on the affected systems.",Cisco,"Cisco Adaptive Security Appliance (asa) Software,Cisco Firepower Threat Defense Software",7.7,HIGH,0.0004299999854993075,false,,false,false,true,2024-10-24T18:15:09.000Z,,false,false,,2024-10-23T18:15:00.000Z,0 CVE-2024-20426,https://securityvulnerability.io/vulnerability/CVE-2024-20426,Cisco ASA Software Vulnerability Allows Remote Denial of Service,"A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol used for VPN termination in Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Software poses a risk of denial of service (DoS) attacks. This issue arises from insufficient input validation, allowing unauthenticated remote attackers to send specially crafted IKEv2 traffic to the affected devices. Exploiting this vulnerability may lead to device reloads, resulting in service interruptions. Organizations using these Cisco products must take immediate action to mitigate potential risks and safeguard their network operations. More details can be found in the advisory linked below.",Cisco,"Cisco Adaptive Security Appliance (asa) Software,Cisco Firepower Threat Defense Software",8.6,HIGH,0.0004600000102072954,false,,false,false,true,2024-10-24T16:15:07.000Z,,false,false,,2024-10-23T18:15:00.000Z,0 CVE-2024-20424,https://securityvulnerability.io/vulnerability/CVE-2024-20424,Cisco Secure FMC Software Vulnerability Allows Root Access via Authenticated HTTP Requests,"A vulnerability exists in the web-based management interface of Cisco Secure Firewall Management Center Software, formerly known as Firepower Management Center Software. This flaw arises from insufficient input validation of specific HTTP requests, enabling an authenticated remote attacker to exploit the vulnerability. By sending a specially crafted HTTP request after gaining authentication, the attacker could execute arbitrary commands on the underlying operating system as root. This includes the potential to affect managed Cisco Firepower Threat Defense devices, creating a significant security risk for organizations relying on these systems. To successfully exploit this vulnerability, valid credentials for a user account with a minimum role of Security Analyst (Read Only) are required.",Cisco,Cisco Firepower Management Center,9.9,CRITICAL,0.0005200000014156103,false,,true,false,true,2024-10-24T16:15:07.000Z,,false,false,,2024-10-23T18:15:00.000Z,0 CVE-2024-20412,https://securityvulnerability.io/vulnerability/CVE-2024-20412,Unauthenticated Local Attackers Can Access Affected Systems via Static Credentials,"Cisco Firepower Threat Defense Software is exposed to a significant vulnerability that enables an unauthenticated local attacker to gain access to the system via static credentials. This vulnerability arises from hard-coded passwords embedded within static accounts on the affected devices. If exploited, an attacker could log in to the Command Line Interface (CLI) and potentially access restricted data, execute basic troubleshooting commands, modify configuration settings, or compromise the device's operational capacity, potentially rendering it inoperable and necessitating a complete reimage. This poses serious risks to network security and system integrity for affected Cisco Firepower Series devices.",Cisco,Cisco Firepower Threat Defense Software,8.4,HIGH,0.0005300000193528831,false,,false,false,true,2024-10-24T16:15:07.000Z,,false,false,,2024-10-23T18:15:00.000Z,0 CVE-2024-20402,https://securityvulnerability.io/vulnerability/CVE-2024-20402,Cisco ASA and FTD Devices Vulnerable to SSL/TLS Memory Management Memory Flaw,"A vulnerability exists in the SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software, allowing unauthenticated remote attackers to disrupt device operations through crafted SSL/TLS packets. This logic error in memory management can lead to unexpected device reloads, inducing a denial of service (DoS) condition. Organizations utilizing affected Cisco products should evaluate their exposure and implement relevant security measures to mitigate potential exploits.",Cisco,"Cisco Adaptive Security Appliance (asa) Software,Cisco Firepower Threat Defense Software",8.6,HIGH,0.0006099999882280827,false,,false,false,true,2024-10-24T17:15:07.000Z,,false,false,,2024-10-23T18:15:00.000Z,0 CVE-2024-20260,https://securityvulnerability.io/vulnerability/CVE-2024-20260,Cisco Adaptive Security Virtual Appliance and Secure Firewall Threat Defense Virtual SSL VPN Denial of Service Vulnerability,"A vulnerability in the Cisco Adaptive Security Virtual Appliance and Cisco Secure Firewall Threat Defense Virtual platforms permits unauthenticated remote attackers to exploit inadequate memory management associated with new incoming SSL/TLS connections. By overwhelming the virtual devices with numerous connection requests, attackers can cause the system to experience a progressive depletion of available memory. This condition can severely impair the processing of SSL VPN connections, leading to interruptions in service. Recovery may require halting the attack traffic, although a manual device reload could be necessary for immediate restoration of operations.",Cisco,"Cisco Adaptive Security Appliance (asa) Software,Cisco Firepower Threat Defense Software",8.6,HIGH,0.0004299999854993075,false,,false,false,true,2024-10-24T18:15:07.000Z,,false,false,,2024-10-23T17:15:00.000Z,0 CVE-2024-20330,https://securityvulnerability.io/vulnerability/CVE-2024-20330,Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series TCP UDP Snort 2 and Snort 2 Denial of Service Vulnerability,"A vulnerability exists within the Snort 2 and Snort 3 TCP and UDP detection engines of Cisco's Firepower Threat Defense (FTD) Software deployed on Firepower 2100 Series Appliances. This flaw is characterized by improper memory management that comes into play when specific TCP and UDP packets are processed. An unauthenticated remote attacker could exploit this vulnerability by sending tailored packets to a system using the Snort detection engine. Doing so could lead to repeated restarts of the Snort engine, resulting in a denial of service (DoS) condition for the traffic being analyzed. Notably, the device itself remains manageable over the network, yet once memory is compromised, resolution requires manual intervention by reloading the appliance, thereby resulting in disruption until action is taken.",Cisco,Cisco Firepower Threat Defense Software,8.6,HIGH,0.00044999999227002263,false,,false,false,true,2024-10-24T17:15:07.000Z,,false,false,,2024-10-23T17:15:00.000Z,0 CVE-2024-20351,https://securityvulnerability.io/vulnerability/CVE-2024-20351,Cisco Firepower Threat Defense Software Snort Firewall Denial of Service Vulnerability,"A vulnerability exists in the TCP/IP traffic handling function of Cisco's Snort Detection Engine within the Firepower Threat Defense (FTD) Software and FirePOWER Services. This flaw allows an unauthenticated, remote adversary to disrupt legitimate network activities by overwhelming the affected system with excessive TCP/IP traffic. Exploiting this vulnerability can result in a denial of service (DoS) condition, where network traffic is erroneously dropped, significantly impairing system performance. To recover from this condition, a reboot of the affected device is required.",Cisco,Cisco Firepower Threat Defense Software,8.6,HIGH,0.00044999999227002263,false,,false,false,true,2024-10-24T16:15:07.000Z,,false,false,,2024-10-23T17:15:00.000Z,0