CVE Vulnerabilities

CVE-2025-20256

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: May 21, 2025 | Modified: Aug 01, 2025
CVSS 3.x
7.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability in the web-based management interface of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system.

This vulnerability is due to insufficient input validation in specific fields of the web-based management interface. An attacker with valid administrative credentials could exploit this vulnerability by sending crafted input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. 

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Secure_network_analytics Cisco 7.4.1 (including) 7.4.1 (including)
Secure_network_analytics Cisco 7.4.2 (including) 7.4.2 (including)
Secure_network_analytics Cisco 7.5.0 (including) 7.5.0 (including)
Secure_network_analytics Cisco 7.5.1 (including) 7.5.1 (including)
Secure_network_analytics Cisco 7.5.2 (including) 7.5.2 (including)

Potential Mitigations

References