A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system.
This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:cisco:secure_network_analytics:7.5.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-02-22:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-03-08:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-04-15:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-05-15:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-06-10:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-07-09:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-08-13:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-09-12:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-10-15:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2024-12-02:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.0:rollup_2025-01-24:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.1:-:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.1:rollup_2024-08-14:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.1:rollup_2024-09-18:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.1:rollup_2024-10-15:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.1:rollup_2024-11-12:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.1:rollup_2025-01-07:*:*:*:*:*:* cpe:2.3:a:cisco:secure_network_analytics:7.5.2:-:*:*:*:*:*:* |
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root. | |
Title | Cisco Secure Network Analytics Privilege Escalation Vulnerability | |
Weaknesses | CWE-347 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published: 2025-04-16T16:07:30.356Z
Updated: 2025-04-17T03:55:24.297Z
Reserved: 2024-10-10T19:15:13.225Z
Link: CVE-2025-20178

Updated: 2025-04-16T16:37:14.749Z

Status : Analyzed
Published: 2025-04-16T16:15:29.457
Modified: 2025-08-01T18:31:17.653
Link: CVE-2025-20178

No data.