mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
515 lines
27 KiB
JSON
515 lines
27 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2025-20181",
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Improper Verification of Cryptographic Signature",
|
|
"cweId": "CWE-347"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Cisco",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "IOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(1)XO1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(1)XO"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)XO"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(1)EY"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(1)EY1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(1)EY2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SE8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(1)EX"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2a)EX5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX10"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX11"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX13"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)EX12"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(3)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(3)E1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2a)E1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2a)E2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(3)E2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(3a)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(3)E3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(3)E4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(5)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(5)E1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(5b)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E5a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E5b"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(5)E2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)E0a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)E1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)E0c"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)E2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E9"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(2)E10"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)E2a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)E2b"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E0a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E0b"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E0s"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)E3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E9"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7a)E0b"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E10"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7b)E0b"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E2a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E10a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E3k"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(8)E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(8)E1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(8)E2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)E10d"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(8)E3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(8)E4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E9"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(8)E5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(8)E6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(7)E10"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(6)EB"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)EA7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)EA8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)EA9"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.2(4)EA9a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0(2)SQD8"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq",
|
|
"refsource": "MISC",
|
|
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
|
|
"discovery": "INTERNAL",
|
|
"defects": [
|
|
"CSCvd75918"
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 6.8,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "PHYSICAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
}
|
|
]
|
|
}
|
|
} |